Sciweavers

2236 search results - page 331 / 448
» Intrusion detection techniques and approaches
Sort
View
IUI
2006
ACM
14 years 3 months ago
Recovering semantic relations from web pages based on visual cues
Recovering semantic relations between different parts of web pages are of great importance for multi-platform web interface development, as they make it possible to re-distribute ...
Peifeng Xiang, Yuanchun Shi
SENSYS
2006
ACM
14 years 3 months ago
Lazy cross-link removal for geographic routing
Geographic techniques promise highly scalable any-toany routing in wireless sensor networks. In one thread of research on geographic routing, researchers have explored robust, dis...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
DISCEX
2003
IEEE
14 years 2 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
CONCUR
2000
Springer
14 years 1 months ago
LP Deadlock Checking Using Partial Order Dependencies
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit su...
Victor Khomenko, Maciej Koutny
SIBGRAPI
1999
IEEE
14 years 1 months ago
Real-Time Shadow Generation Using BSP Trees and Stencil Buffers
This paper describes a real-time shadow generation algorithm for polygonal environments illuminated by movable point light sources. The main goal is to quickly reduce the number o...
Harlen Costa Batagelo, Ilaim Costa Júnior