Sciweavers

2421 search results - page 435 / 485
» Approximate Flow-Aware Networking
Sort
View
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICANN
2009
Springer
14 years 2 months ago
Modelling Image Complexity by Independent Component Analysis, with Application to Content-Based Image Retrieval
Abstract. Estimating the degree of similarity between images is a challenging task as the similarity always depends on the context. Because of this context dependency, it seems qui...
Jukka Perkiö, Aapo Hyvärinen
ISNN
2009
Springer
14 years 2 months ago
An Improved Quantum Evolutionary Algorithm with 2-Crossovers
Quantum evolutionary algorithm (QEA) is proposed on the basis of the concept and principles of quantum computing, which is a classical metaheuristic algorithm for the approximate s...
Zhihui Xing, Haibin Duan, Chunfang Xu
MIDDLEWARE
2009
Springer
14 years 2 months ago
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
Abstract. Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environmen...
Vasanth Rajamani, Christine Julien, Jamie Payton, ...
CISIM
2008
IEEE
14 years 2 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...