Sciweavers

429 search results - page 67 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
DKE
2008
108views more  DKE 2008»
13 years 8 months ago
The thematic and citation landscape of Data and Knowledge Engineering
The thematic and citation structures of Data and Knowledge Engineering (DKE) (1985-2007) are identified based on text analysis and citation analysis of the bibliographic records o...
Chaomei Chen, Il-Yeol Song, Xiaojun Yuan, Jian Zha...
ADHOCNOW
2009
Springer
13 years 9 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
ISCAS
2008
IEEE
113views Hardware» more  ISCAS 2008»
14 years 2 months ago
Stability study of the TCP-RED system using detrended fluctuation analysis
— It has been observed that the TCP-RED system may exhibit instability and oscillatory behavior. Control methods proposed in the past have been based on the analytical models tha...
Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Tr...
CSDA
2007
264views more  CSDA 2007»
13 years 8 months ago
Model-based methods to identify multiple cluster structures in a data set
Model-based clustering exploits finite mixture models for detecting group in a data set. It provides a sound statistical framework which can address some important issues, such as...
Giuliano Galimberti, Gabriele Soffritti
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...