Sciweavers

683 search results - page 36 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
78
Voted
ACSAC
2003
IEEE
15 years 5 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
141
Voted
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
14 years 4 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...
105
Voted
APCHI
2004
IEEE
15 years 4 months ago
Designing for Flow in a Complex Activity
One component of a user's interaction with computer systems is commonly referred to as `flow'. Flow is an important consideration in interactive system design as it enca...
Jon M. Pearce, Steve Howard
96
Voted
ICASSP
2010
IEEE
15 years 23 days ago
Fast signal analysis and decomposition on graphs using the Sparse Matrix Transform
Recently, the Sparse Matrix Transform (SMT) has been proposed as a tool for estimating the eigen-decomposition of high dimensional data vectors [1]. The SMT approach has two major...
Leonardo R. Bachega, Guangzhi Cao, Charles A. Boum...
CSCW
2004
ACM
15 years 6 months ago
Field studies of computer system administrators: analysis of system management tools and practices
Computer system administrators are the unsung heroes of the information age, working behind the scenes to configure, maintain, and troubleshoot the computer infrastructure that un...
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben M...