Sciweavers

10916 search results - page 2165 / 2184
» On Constructive Connectives and Systems
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 6 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
IJWIS
2006
91views more  IJWIS 2006»
13 years 6 months ago
Handheld Computing and Programming for Mobile Commerce
: Using Internet-enabled mobile handheld devices to access the World Wide Web is a promising addition to the Web and traditional e-commerce. Mobile handheld devices provide conveni...
Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 6 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
IPM
2006
108views more  IPM 2006»
13 years 6 months ago
Using searcher simulations to redesign a polyrepresentative implicit feedback interface
Information seeking is traditionally conducted in environments where search results are represented at the user interface by a minimal amount of meta-information such as titles an...
Ryen W. White
ISCA
2006
IEEE
144views Hardware» more  ISCA 2006»
13 years 6 months ago
Conditional Memory Ordering
Conventional relaxed memory ordering techniques follow a proactive model: at a synchronization point, a processor makes its own updates to memory available to other processors by ...
Christoph von Praun, Harold W. Cain, Jong-Deok Cho...
« Prev « First page 2165 / 2184 Last » Next »