Sciweavers

1318 search results - page 131 / 264
» Measuring network security using dynamic bayesian network
Sort
View
AINA
2005
IEEE
14 years 2 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
WOWMOM
2005
ACM
106views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
A Framework for Dynamic Service Composition
To be able to utilize the generative potential of future networks for service composition, the attributes of services and networks must be appropriately formalized, stored and mad...
Paramai Supadulchai, Finn Arve Aagesen
EAAI
2008
116views more  EAAI 2008»
13 years 9 months ago
Robust neuro-identification of nonlinear plants in electric power systems with missing sensor measurements
Fault tolerant measurements are an essential requirement for system identification, control and protection. Measurements can be corrupted or interrupted due to sensor failure, bro...
Wei Qiao, Zhi Gao, Ronald G. Harley, Ganesh K. Ven...
KDD
2002
ACM
191views Data Mining» more  KDD 2002»
14 years 9 months ago
Multimedia Knowledge Integration, Summarization And Evaluation
This paper presents new methods for automatically integrating, summarizing and evaluating multimedia knowledge. These are essential for multimedia applications to efficiently and ...
Ana B. Benitez, Shih-Fu Chang
HOTNETS
2010
13 years 4 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...