Sciweavers

1554 search results - page 241 / 311
» A New Simulation Tool for the Modeling and Control of Distri...
Sort
View
ISW
2010
Springer
13 years 5 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ENGL
2007
103views more  ENGL 2007»
13 years 7 months ago
Fault Diagnosis of Manufacturing Processes via Genetic Algorithm Approach
—Instantaneous detection and diagnosis of various faults and break-downs in industrial processes is required to reduce production losses and damage to equipments. A solved knowle...
Stefania Gallova
PERCOM
2008
ACM
14 years 7 months ago
Location Fingerprint Analyses Toward Efficient Indoor Positioning
Abstract--Analytical models to evaluate and predict "precision" performance of indoor positioning systems based on location fingerprinting are lacking. Such models can be...
Nattapong Swangmuang, Prashant Krishnamurthy
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
14 years 1 months ago
Governance of the IT Function: Valuing Agility and Quality of Training, Cooperation and Communications
It has long been argued that the organizational structure and reporting relationships of the IT functional area profoundly affects organizational performance. However, since most ...
Felipe Csaszar, Eric K. Clemons
CNSM
2010
13 years 6 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba