Sciweavers

1737 search results - page 99 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
98
Voted
EUROSEC
2010
ACM
15 years 6 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
HAPTICS
2009
IEEE
15 years 6 months ago
Functional analysis of finger contact locations during grasping
In this paper we present a method for studying human selection of fingertip contact point locations during grasping and manipulation. Our aim is to perform a functional analysis,...
Matei T. Ciocarlie, Hao Dang, Jamie Lukos, Marco S...
WWW
2004
ACM
16 years 17 days ago
Ontological representation of learning objects: building interoperable vocabulary and structures
The ontological representation of learning objects is a way to deal with the interoperability and reusability of learning objects (including metadata) through providing a semantic...
Jian Qin, Naybell Hernández
BMCBI
2008
115views more  BMCBI 2008»
15 years 6 hour ago
BioGraphE: high-performance bionetwork analysis using the Biological Graph Environment
Background: Graphs and networks are common analysis representations for biological systems. Many traditional graph algorithms such as k-clique, k-coloring, and subgraph matching h...
George Chin Jr., Daniel G. Chavarría-Mirand...
ICVS
2001
Springer
15 years 4 months ago
Adapting Object Recognition across Domains: A Demonstration
High-level vision systems use object, scene or domain specific knowledge to interpret images. Unfortunately, this knowledge has to be acquired for every domain. This makes it diffi...
Bruce A. Draper, Ulrike Ahlrichs, Dietrich Paulus