Sciweavers

20059 search results - page 3927 / 4012
» The Satellite Data Model
Sort
View
110
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 6 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
CCS
2004
ACM
15 years 6 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
104
Voted
DRM
2004
Springer
15 years 6 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
ESORICS
2004
Springer
15 years 6 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
109
Voted
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
15 years 6 months ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
« Prev « First page 3927 / 4012 Last » Next »