Sciweavers

1078 search results - page 193 / 216
» Analyzing DB2 Data Sharing Performance Problems
Sort
View
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 3 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
ICPR
2000
IEEE
14 years 10 months ago
Mixture Densities for Video Objects Recognition
The appearance of non-rigid objects detected and tracked in video streams is highly variable and therefore makes the identification of similar objects very complex. Furthermore, i...
Riad I. Hammoud, Roger Mohr
ADBIS
2009
Springer
108views Database» more  ADBIS 2009»
14 years 3 months ago
Probabilistic Granule-Based Inside and Nearest Neighbor Queries
The development of location-based services and advances in the field of mobile computing have motivated an intensive research effort devoted to the efficient processing of locati...
Sergio Ilarri, Antonio Corral, Carlos Bobed, Eduar...
PKDD
2005
Springer
89views Data Mining» more  PKDD 2005»
14 years 2 months ago
Community Mining from Multi-relational Networks
Abstract. Social network analysis has attracted much attention in recent years. Community mining is one of the major directions in social network analysis. Most of the existing met...
Deng Cai, Zheng Shao, Xiaofei He, Xifeng Yan, Jiaw...
VIZSEC
2005
Springer
14 years 2 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...