Sciweavers

997 search results - page 186 / 200
» On the Use of Virtualization and Service Technologies to Ena...
Sort
View
FLAIRS
2003
13 years 9 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
JDCTA
2008
119views more  JDCTA 2008»
13 years 7 months ago
Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web
Pervasive computing is an emerging computing paradigm, which is expected to be part of our everyday life in the foreseeable future. The coordination among heterogeneous devices, s...
Liang Li, Bin Li, Junwu Zhu
FTIR
2007
119views more  FTIR 2007»
13 years 7 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee
IJWMC
2010
103views more  IJWMC 2010»
13 years 4 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
JSAC
2011
191views more  JSAC 2011»
13 years 2 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz