Sciweavers

17789 search results - page 3377 / 3558
» Exceptional Use Cases
Sort
View
RAID
2009
Springer
15 years 10 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
SAGT
2009
Springer
140views Game Theory» more  SAGT 2009»
15 years 10 months ago
Price of Stability in Survivable Network Design
We study the survivable version of the game theoretic network formation model known as the Connection Game, originally introduced in [5]. In this model, players attempt to connect ...
Elliot Anshelevich, Bugra Caskurlu
COMPGEOM
2009
ACM
15 years 10 months ago
Epsilon nets and union complexity
We consider the following combinatorial problem: given a set of n objects (for example, disks in the plane, triangles), and an integer L ≥ 1, what is the size of the smallest su...
Kasturi R. Varadarajan
IMC
2009
ACM
15 years 10 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
MM
2009
ACM
199views Multimedia» more  MM 2009»
15 years 10 months ago
Beyond flat surface computing: challenges of depth-aware and curved interfaces
In the past decade, multi-touch-sensitive interactive surfaces have transitioned from pure research prototypes in the lab, to commercial products with wide-spread adoption. One of...
Hrvoje Benko
« Prev « First page 3377 / 3558 Last » Next »