Sciweavers

11580 search results - page 2308 / 2316
» Communication vs. Computation
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
FLAIRS
2009
13 years 5 months ago
Are Ontologies Involved in Natural Language Processing?
For certain disable persons unable to communicate, we present a palliative aid which consist of a virtual pictographic keyboard associated to a text processing from a pictographic...
Maryvonne Abraham
FM
2009
Springer
134views Formal Methods» more  FM 2009»
13 years 5 months ago
Partial Order Reductions Using Compositional Confluence Detection
Abstract. Explicit state methods have proven useful in verifying safetycritical systems containing concurrent processes that run asynchronously and communicate. Such methods consis...
Frédéric Lang, Radu Mateescu
GVD
2009
108views Database» more  GVD 2009»
13 years 5 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
CCR
2011
13 years 2 months ago
Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs
Proliferation and innovation of wireless technologies require significant amounts of radio spectrum. Recent policy reforms by the FCC are paving the way by freeing up spectrum fo...
Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, Hai...
« Prev « First page 2308 / 2316 Last » Next »