Sciweavers

4307 search results - page 767 / 862
» Dynamic Spyware Analysis
Sort
View
ISI
2006
Springer
13 years 8 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
JNCA
2008
103views more  JNCA 2008»
13 years 8 months ago
Congestion control of bluetooth radio system by piconet restructuring
Bluetooth is a low-cost and short-range wireless communication technology. Two or more bluetooth devices connected form a piconet and two or more piconets connected form a scatter...
Gwo-Jong Yu, Chih-Yung Chang
JNCA
2008
154views more  JNCA 2008»
13 years 8 months ago
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility
Bluetooth technology is specially designed for the wireless personal area networks to replace cable. Several challenges exist in Bluetooth scatternet formation and routing, since ...
Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Cha...
DKE
2007
162views more  DKE 2007»
13 years 8 months ago
A new algorithm for clustering search results
We develop a new algorithm for clustering search results. Differently from many other clustering systems that have been recently proposed as a post-processing step for Web search ...
Giansalvatore Mecca, Salvatore Raunich, Alessandro...
JSS
2008
136views more  JSS 2008»
13 years 8 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...