Sciweavers

1347 search results - page 124 / 270
» Towards a Secure Data Stream Management System
Sort
View
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
HIPEAC
2009
Springer
15 years 11 months ago
Mapping and Synchronizing Streaming Applications on Cell Processors
Developing streaming applications on heterogenous multi-processor architectures like the Cell is difficult. Currently, application developers need to know about hardware details t...
Maik Nijhuis, Herbert Bos, Henri E. Bal, Cé...
LWA
2007
15 years 5 months ago
Incremental Mining for Facility Management
Modern buildings are equipped with high-tech systems that take care of several fundamental aspects, e.g., air-conditioning, heating and water supply. The requirements posed on fac...
Katja Hose, Marcel Karnstedt, Daniel Klan, Kai-Uwe...
WWW
2011
ACM
14 years 11 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 10 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...