Sciweavers

683 search results - page 66 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
111
Voted
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 5 months ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
96
Voted
ANCS
2005
ACM
15 years 6 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
97
Voted
IMAGING
2003
15 years 2 months ago
Spectral Color Processing Using an Interim Connection Space
The use of an Interim Connection Space (ICS) is proposed as a means for extending the concept of device independent color management to support spectral imaging. Color management,...
Mitchell R. Rosen, Noboru Ohta
102
Voted
JUCS
2008
112views more  JUCS 2008»
15 years 18 days ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
121
Voted
PE
2008
Springer
167views Optimization» more  PE 2008»
15 years 18 days ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi