Sciweavers

680 search results - page 61 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
LCN
2006
IEEE
14 years 2 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
ASPDAC
2008
ACM
107views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Enabling run-time memory data transfer optimizations at the system level with automated extraction of embedded software metadata
The information about the run-time behavior of software applications is crucial for enabling system level optimizations for embedded systems. This embedded Software Metadata inform...
Alexandros Bartzas, Miguel Peón Quiró...
CSCWD
2008
Springer
13 years 10 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
JCP
2008
104views more  JCP 2008»
13 years 8 months ago
Process Planning Knowledge Discovery Based on CAPP Database for Mechanical Manufacturing Enterprise
Knowledge discovery in database have been attracting a significant amount of research, industry attention in recent years. Process planning knowledge (PPK) is one of the most impor...
Xiaoliang Jia, Zhenming Zhang, Xitian Tian