Sciweavers

3452 search results - page 547 / 691
» Secure Data Outsourcing
Sort
View
108
Voted
ATAL
2004
Springer
15 years 6 months ago
Naming Services in Multi-Agent Systems: A Design for Agent-Based White Pages
Distributed multi-agent systems require naming services to locate and communicate with remote agents. In this paper we focus on the design and implementation of the “White Pages...
Todd Wright
ISI
2004
Springer
15 years 6 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
116
Voted
ISI
2004
Springer
15 years 6 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
121
Voted
AVSS
2003
IEEE
15 years 6 months ago
Invariant Feature Extraction and Biased Statistical Inference for Video Surveillance
Using cameras for detecting hazardous or suspicious events has spurred new research for security concerns. To make such detection reliable, researchers must overcome difficulties...
Yi-Leh Wu, Long Jiao, Gang Wu, Edward Y. Chang, Yu...
100
Voted
ICSM
2003
IEEE
15 years 6 months ago
Critical Success Factors in Software Maintenance-A Case Study
: The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance pr...
Harry M. Sneed, Peter Brössler