Sciweavers

136 search results - page 19 / 28
» Cooperative Transaction Processing between Clients and Serve...
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 8 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
LCTRTS
2000
Springer
13 years 11 months ago
An Integrated Push/Pull Buffer Management Method in Multimedia Communication Environments
Multimedia communication systems require not only high-performance computer hardware and highspeed networks, but also a buffer management mechanism to process voluminous data effi...
Sungyoung Lee, Hyonwoo Seung, Taewoong Jeon
HICSS
1998
IEEE
117views Biometrics» more  HICSS 1998»
13 years 12 months ago
OBIWAN - A Visual Interface for Prompted Query Refinement
Typically, users submit very simple search queries to digital document data collections. Often these queries can result in extremely broad answers or answers in which document rel...
James W. Cooper, Roy J. Byrd
IC
2001
13 years 9 months ago
Design and Implementation of XML-Based Digital Video Library System
In this paper, we describe the design and implementation of an XML-Based Digital Video Library (XDVL) System. The system includes automatic processes from video creation through v...
Jacky C. K. Ma, Michael R. Lyu
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 7 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu