Sciweavers

5056 search results - page 922 / 1012
» Network Coding Theory
Sort
View
140
Voted
IEEEIAS
2009
IEEE
15 years 9 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
122
Voted
COMPLEX
2009
Springer
15 years 9 months ago
Retail Location Choice with Complementary Goods: An Agent-Based Model
This paper examines the emergence of retail clusters on a supply chain network comprised of suppliers, retailers, and consumers. An agent-based model is proposed to investigate ret...
Arthur Huang, David Levinson
125
Voted
APSEC
2008
IEEE
15 years 9 months ago
Flexible Generation of Pervasive Web Services Using OSGi Declarative Services and OWL Ontologies
There is a growing trend to deploy web services in pervasive computing environments. Implementing web services on networked, embedded devices leads to a set of challenges, includi...
Klaus Marius Hansen, Weishan Zhang, João Fe...
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 9 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe
IPPS
2008
IEEE
15 years 9 months ago
On utilization of contributory storage in desktop grids
Modern desktop grid environments and shared computing platforms have popularized the use of contributory resources, such as desktop computers, as computing substrates for a variet...
Chreston Miller, Ali Raza Butt, Patrick Butler