Sciweavers

2562 search results - page 286 / 513
» An Internet without the Internet protocol
Sort
View
IADIS
2003
15 years 5 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
ICWS
2003
IEEE
15 years 5 months ago
Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges
Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across variou...
Vagan Y. Terziyan, Oleksandr Kononenko
111
Voted
WWW
2010
ACM
15 years 4 months ago
Implementing the media fragments URI specification
In this paper, we describe two examples of implementations of the Media Fragments URI specification which is currently being developed by the W3C Media Fragments Working Group. Th...
Davy Van Deursen, Raphaël Troncy, Erik Mannen...
TSMC
2008
172views more  TSMC 2008»
15 years 3 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
IMC
2010
ACM
15 years 1 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...