Sciweavers

3004 search results - page 474 / 601
» Nonlinear Mapping Networks
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
NETGAMES
2005
ACM
14 years 1 months ago
Game server selection for multiple players
The increase in power and connectivity of computers has enabled a growth in network games, with many games having numerous servers to which a player can connect. The game server s...
Steven Gargolinski, Christopher St. Pierre, Mark C...
SAC
2005
ACM
14 years 1 months ago
Discovering parametric clusters in social small-world graphs
We present a strategy for analyzing large, social small-world graphs, such as those formed by human networks. Our approach brings together ideas from a number of different resear...
Jonathan McPherson, Kwan-Liu Ma, Michael Ogawa
HUC
2005
Springer
14 years 1 months ago
Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game
This paper presents Treasure, an outdoor mobile multiplayer game inspired by Weiser’s notion of seams, gaps and breaks in different media. Playing Treasure involves movement in a...
Louise Barkhuus, Matthew Chalmers, Paul Tennent, M...
ISI
2005
Springer
14 years 1 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...