Skip to main content
    • by 
    •   9  
      EconomicsMathematical EconomicsAsymmetric InformationNo-Arbitrage
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
    • by 
    •   20  
      Computer ScienceComputer ForensicsData AnalysisComputer Security
    • by 
    •   16  
      Finite Element MethodsResponse Surface MethodologyFinite ElementOptimization Problem
    • by 
    •   22  
      Information RetrievalPrivacyCryptographyDistributed System
    • by 
    •   12  
      Evolutionary algorithmsEvolutionary ComputationGenetic AlgorithmsGenetic Algorithm
    • by 
    •   10  
      Information RetrievalInformation ManagementPersonal Information ManagementOntologies
    • by 
    •   14  
      Information SystemsKnowledge RepresentationMarketing ManagementInformation Processing
    • by 
    •   16  
      Information RetrievalContent AnalysisInformation FilteringSearch Engines
SEMATECH has sponsored a “Test Method Evaluation” study to understand the trade-offs among the most common test methodologies used in the industry. This paper presents the results of the failure analysis portion of that project. The... more
    • by 
    •   10  
      MicroelectronicsFault DetectionTVFailure Analysis
    • by 
    •   13  
      Data MiningSignal ProcessingFault DetectionControl Systems
Information analysts must rapidly assess information to determine its usefulness in supporting and informing decision makers. In addition to assessing the content, the analyst must be confident about the quality and veracity of the... more
    • by 
    •   13  
      Information VisualizationData AnalysisScientific ComputingLaw Enforcement
    • by 
    •   7  
      EngineeringFunctional AnalysisEconomicsResearch Methodology
    • by 
    •   21  
      Differential EvolutionFading ChannelAlgorithmCoding
In the mostly self-regulated arboricultural industry, Louisiana, U.S., is one of a few places where arborists must possess a license to operate. Since 1993, state-licensed arborists in Louisiana have been required to attend at least one... more
    • by 
    •   8  
      Professional TrainingMedicineCONTINUING EDUCATIONArboriculture
    • by 
    •   5  
      Virtual RealityVirtual EnvironmentDesign of experimentInformation Analysis
    • by 
    •   20  
      EngineeringUsabilityDecision MakingData Analysis
    • by 
    •   15  
      Abstract InterpretationEmbedded SystemsSystems AnalysisEmbedded Software
    • by 
    •   15  
      Information SciencePublishingInformation ManagementMetadata
The performance of target identification can be improved by fusing the data from multiple sensors. Even though distributed fusion has advantages of lower communication bandwidth, less processing at a central location, and increased... more
    • by 
    •   11  
      Computer ScienceGraph TheoryCommunication ManagementBayesian Networks
The advanced traveler information system (ATIS) is a type of intelligent transportation system application areas that implements emerging computer, communication, and information technologies to provide vital information to the users of a... more
    • by 
    •   20  
      Information SystemsEngineeringCivil EngineeringComputer Science
    • by 
    •   14  
      Computer ScienceSoftware EngineeringSoftware MaintenanceStatic Analysis
Abstract—The aim of this study was to investigate the value of fractal dimension in separating normal and cancerous images, and to examine the relationship between fractal dimension and traditional texture analysis features. Forty-four... more
    • by  and +1
    •   20  
      EngineeringMathematicsComputer ScienceCancer
    • by 
    •   7  
      Information SystemsComputer SciencePetri NetsPetri Net
    • by 
    •   17  
      BiomimeticsTitaniumPropulsionElasticity
    • by 
    •   23  
      EngineeringAlgorithmsTime SeriesIterative Methods
    • by 
    •   11  
      Computer ScienceData MiningComputational LinguisticsData Analysis
    • by 
    •   13  
      Software EngineeringMultiagent SystemsAgent BasedEnvironmental Management
Hurricanes are the costliest natural disasters in the United States. Understanding both hurricane frequencies and intensities is a topic of great interest to meteorologists, decision makers and the general public alike. Previous research... more
    • by 
    •   5  
      Environmental ChangeNew OrleansHurricane KatrinaNatural disaster
    • by 
    •   10  
      Software EngineeringSoftware MaintenanceStatic AnalysisSoftware Testing
The goal of this research was to describe the ability of human operators to interact with adaptive automation (AA) applied to various stages of complex systems information processing, defined in a model of human-automation interaction.... more
    • by 
    •   20  
      Information SystemsCognitive ScienceErgonomicsDecision Making
    • by 
    •   8  
      StatisticsStatic AnalysisQuery OptimizationData Structure
    • by 
    •   28  
      CartographyGeologyGeophysicsSpectroscopy
    • by 
    •   16  
      Computer ScienceInformation SecurityComputational ModelingComputer Networks
    • by 
    •   17  
      Information SystemsPsychologyKnowledge ManagementNetwork Analysis
    • by 
    •   16  
      Distributed ComputingGraph TheoryComputer NetworksCriminal Investigation
    • by 
    •   5  
      Computer SecurityInformation ProcessingPublic key cryptographyInformation Analysis
    • by 
    •   4  
      Automotive IndustryGroup workCollaborative SystemInformation Analysis
    • by 
    •   14  
      ForecastingProcess DesignPolitical processes modeling and forecastingProcess Variation
Modern automobiles come with a high degree of electron- ics and an enormous amount of in-car communication ac- tivities. This leads to an increasingly complex data volume which challenges automotive engineers in detecting and ana- lyzing... more
    • by 
    •   4  
      Automotive IndustryGroup workCollaborative SystemInformation Analysis
    • by  and +1
    •   9  
      MarketingApplied EconomicsBayesian AnalysisPanel Data
    • by 
    •   8  
      BusinessDecision Making ProcessesBusiness IntelligenceBusiness Intelligence (BI)
This paper describes the interface design of our AeSon (Aesthetic Sonification) Toolkit motivated by user-centred customisation of the aesthetic representation and scope of the data. The interface design is developed from 3 premises that... more
    • by 
    •   7  
      Information VisualizationInterface DesignInformation DesignInformation Analysis
    • by 
    •   17  
      Software EngineeringDecision MakingData AnalysisSustainable Development
    • by 
    •   15  
      Distributed ComputingInformation IntegrationComputer SoftwareProduct Lifecycle Management
Abstract—The advanced traveler information system (ATIS) is a type of intelligent transportation system application areas that implements emerging computer, communication, and informa-tion technologies to provide vital information to the... more
    • by 
    •   20  
      Information SystemsEngineeringCivil EngineeringComputer Science
In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods that when combined together, can reduce the... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyCryptographyAuthentication
    • by 
    •   16  
      Information SystemsData MiningData AnalysisXML
    • by  and +1
    •   13  
      Decision MakingSituation awarenessInformation ProcessingDynamic control
    • by 
    •   10  
      Research MethodologyQualitative methodologyActive LearningQualitative Research
    • by  and +1
    •   9  
      Project ManagementManagement AccountingTechnology ManagementCommunication Technology