Sciweavers

413 search results - page 55 / 83
» A network service curve approach for the stochastic analysis...
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
CP
2006
Springer
13 years 11 months ago
Decomposition of Multi-operator Queries on Semiring-Based Graphical Models
Abstract. In the last decades, the Satisfiability and Constraint Satisfaction Problem frameworks were extended to integrate aspects such as uncertainties, partial observabilities, ...
Cédric Pralet, Thomas Schiex, Gérard...
DATE
2009
IEEE
121views Hardware» more  DATE 2009»
14 years 2 months ago
Remote measurement of local oscillator drifts in FlexRay networks
—Distributed systems, especially time-triggered ones, are implementing clock synchronization algorithms to provide and maintain a common view of time among the different nodes. S...
Eric Armengaud, Andreas Steininger
JUCS
2010
121views more  JUCS 2010»
13 years 2 months ago
Real-time Analysis of Time-based Usability and Accessibility for Human Mobile-Web Interactions in the Ubiquitous Internet
: In the ubiquitous Internet, human mobile-web interactions can be evaluated with real-time analysis of time-based usability and accessibility with the different types of mobile In...
Yung Bok Kim
TMC
2012
11 years 9 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright