Sciweavers

7847 search results - page 1528 / 1570
» Designing intimate experiences
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 9 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2008
153views more  COMCOM 2008»
13 years 9 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 9 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
DEBU
2008
136views more  DEBU 2008»
13 years 9 months ago
Towards a Unified Declarative and Imperative XQuery Processor
Since the birth of XML, the processing of XML query languages like XQuery/XQueryP has been widely researched in the academic and industrial communities. Most of the approaches con...
Zhen Hua Liu, Anguel Novoselsky, Vikas Arora
DSS
2008
186views more  DSS 2008»
13 years 9 months ago
A machine learning approach to web page filtering using content and structure analysis
As the Web continues to grow, it has become increasingly difficult to search for relevant information using traditional search engines. Topic-specific search engines provide an al...
Michael Chau, Hsinchun Chen
« Prev « First page 1528 / 1570 Last » Next »