Sciweavers

11462 search results - page 2274 / 2293
» Developing Application-Centric Methods
Sort
View
JPDC
2006
253views more  JPDC 2006»
13 years 10 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
JSAC
2006
181views more  JSAC 2006»
13 years 10 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
JSAC
2006
167views more  JSAC 2006»
13 years 10 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
MMS
2008
13 years 10 months ago
Semantic interactive image retrieval combining visual and conceptual content description
We address the challenge of semantic gap reduction for image retrieval through an improved SVM-based active relevance feedback framework, together with a hybrid visual and concept...
Marin Ferecatu, Nozha Boujemaa, Michel Crucianu
MTA
2008
186views more  MTA 2008»
13 years 10 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl
« Prev « First page 2274 / 2293 Last » Next »