Sciweavers

503 search results - page 80 / 101
» Authenticity by tagging and typing
Sort
View
ICITA
2005
IEEE
14 years 1 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
IJCNLP
2005
Springer
14 years 1 months ago
A Preliminary Work on Classifying Time Granularities of Temporal Questions
Abstract. Temporal question classification assigns time granularities to temporal questions ac-cording to their anticipated answers. It is very important for answer extraction and ...
Wei Li, Wenjie Li, Qin Lu, Kam-Fai Wong
IPSN
2005
Springer
14 years 1 months ago
Some sensor network elements for ubiquitous computing
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...
PERVASIVE
2005
Springer
14 years 1 months ago
Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling
The retail store environment is a challenging application area for Pervasive Computing technologies. It has demanding base conditions due to the number and complexity of the interd...
Albert Krohn, Tobias Zimmer, Michael Beigl, Christ...
HICSS
2003
IEEE
132views Biometrics» more  HICSS 2003»
14 years 26 days ago
Experience with ANSI C Markup Language for a Cross-Referencer
The purpose of this paper is twofold: (1) to examine the properties of our ANSI C Markup Language (ACML) as a domain-specific language (DSL); and (2) to show that ACML is useful ...
Hayato Kawashima, Katsuhiko Gondow