Sciweavers

928 search results - page 142 / 186
» Safety management of complex technology
Sort
View
IRI
2006
IEEE
15 years 3 months ago
Provide relevant knowledge to specify product design project needs
1 In many of today’s industry, knowledge is considered a strategic tool; however, knowledge is involved in so many services with so many facets that it is very complex to effecti...
Fabrice Alizon, Steven B. Shooter, Timothy W. Simp...
IWIA
2006
IEEE
15 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
LCN
2006
IEEE
15 years 3 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
ELPUB
2006
ACM
15 years 3 months ago
Knowledge-Based Search in Collections of Digitized Manuscripts: First Results
The paper presents in brief a methodology for development of tools for knowledge-based search in repositories of digitized manuscripts. It is designated to assist the search activ...
Pavel Pavlov, Maria Nisheva-Pavlova
IUI
2006
ACM
15 years 3 months ago
Activity-oriented context-aware adaptation assisting mobile geo-spatial activities
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
Guoray Cai, Yinkun Xue