Sciweavers

1255 search results - page 209 / 251
» Model-Driven Development of Model Transformations
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
ACII
2007
Springer
14 years 4 months ago
Textual Affect Sensing for Sociable and Expressive Online Communication
In this paper, we address the tasks of recognition and interpretation of affect communicated through text messaging. The evolving nature of language in online conversations is a ma...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
ICAC
2006
IEEE
14 years 4 months ago
Utility-aware Resource Allocation in an Event Processing System
— Event processing systems link event producers and consumers in a flexible manner, by supporting multiple communication patterns and powerful message transformations. Such syst...
Sumeer Bhola, Mark Astley, Robert Saccone, Michael...
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 3 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
14 years 3 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar