Sciweavers

3653 search results - page 710 / 731
» Analyzing language development from a network approach
Sort
View
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 8 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
JIPS
2010
195views more  JIPS 2010»
14 years 11 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
WWW
2008
ACM
16 years 5 months ago
A semantic layer for publishing and localizing xml data for a p2p xquery mediator
In this poster, we present the P2P XML data localization layer of XLive, an XQuery mediation system developed at University of Versailles [2]. A major challenge in the evaluation ...
Florin Dragan, Georges Gardarin, Laurent Yeh
NETGAMES
2006
ACM
15 years 10 months ago
Applicability of group communication for increased scalability in MMOGs
Massive multiplayer online games (MMOGs) are today the driving factor for the development of distributed interactive applications, and they are increasing in size and complexity. ...
Knut-Helge Vik, Carsten Griwodz, Pål Halvors...
CCS
2003
ACM
15 years 9 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves