Sciweavers

762 search results - page 145 / 153
» Modeling and Simulating Information Security Management
Sort
View
CN
2007
137views more  CN 2007»
13 years 7 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
CONTEXT
2007
Springer
14 years 1 months ago
Thai Text Coherence Structuring with Coordinating and Subordinating Relations for Text Summarization
Text summarization with the consideration of coherence can be achieved by using discourse processing with the Rhetorical Structure Theory (RST). Additional problems on relational a...
Thana Sukvaree, Asanee Kawtrakul, Jean Caelen
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 1 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
CORR
2006
Springer
99views Education» more  CORR 2006»
13 years 7 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber
WD
2010
13 years 5 months ago
Beamforming for heterogeneously equipped nodes in wireless ad hoc networks
It has long been known that adaptive beamforming has the potential to enhance the performance of wireless ad hoc networks significantly. However, due to the decentralized nature of...
Ulrike Korger, Manuel Wocheslander, Christian Hart...