Sciweavers

14850 search results - page 2776 / 2970
» A Geometric Approach to Betweenness
Sort
View
167
Voted
ICTAI
2008
IEEE
15 years 11 months ago
Information Extraction as an Ontology Population Task and Its Application to Genic Interactions
Ontologies are a well-motivated formal representation to model knowledge needed to extract and encode data from text. Yet, their tight integration with Information Extraction (IE)...
Alain-Pierre Manine, Érick Alphonse, Philip...
178
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
INFOCOM
2008
IEEE
15 years 11 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
INFOCOM
2008
IEEE
15 years 11 months ago
On Wireless Social Community Networks
—Wireless social community networks are emerging as a new alternative to provide wireless data access in urban areas. By relying on users in the network deployment, a wireless co...
Mohammad Hossein Manshaei, Julien Freudiger, M&aac...
146
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Adding Capacity Points to a Wireless Mesh Network Using Local Search
Abstract— Wireless mesh network deployments are popular as a cost-effective means to provide broadband connectivity to large user populations. As the network usage grows, network...
Joshua Robinson, Mustafa Uysal, Ram Swaminathan, E...
« Prev « First page 2776 / 2970 Last » Next »