Sciweavers

652 search results - page 124 / 131
» A Knowledge-Based System within a Cooperative Processing Env...
Sort
View
HT
1998
ACM
13 years 11 months ago
Link services or link agents?
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Les Carr, Wendy Hall, Steve Hitchcock
JDCTA
2010
172views more  JDCTA 2010»
13 years 2 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 28 days ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
AUSDM
2008
Springer
271views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Classification of Brain-Computer Interface Data
In this paper we investigate the classification of mental tasks based on electroencephalographic (EEG) data for Brain Computer Interfaces (BCI) in two scenarios: off line and on-l...
Omar AlZoubi, Irena Koprinska, Rafael A. Calvo
CG
2006
Springer
13 years 7 months ago
Constrained diffusion-limited aggregation in 3 dimensions
Diffusion Limited Aggregation (DLA) has usually been studied in 2 dimensions as a model of fractal growth processes such as river networks, plant branching, frost on glass, electr...
Paul D. Bourke