Sciweavers

10414 search results - page 2077 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
EJWCN
2010
138views more  EJWCN 2010»
13 years 2 months ago
An Interference-Aware Admission Control Design for Wireless Mesh Networks
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Devu Manikantan Shila, Tricha Anjali
GIS
2010
ACM
13 years 2 months ago
Modelling spatial video as part of a GIS video analysis framework
It is now common for video; real-time and collected, mobile and static, to be georeferenced and stored in large archives for users of expert systems to access and interact with. I...
Paul Lewis
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JIPS
2010
159views more  JIPS 2010»
13 years 2 months ago
A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Software evolution is an ongoing process carried out with the aim of extending base applications either for adding new functionalities or for adapting software to changing environm...
Chetna Gupta, Yogesh Singh, Durg Singh Chauhan
JIPS
2010
195views more  JIPS 2010»
13 years 2 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
« Prev « First page 2077 / 2083 Last » Next »