Sciweavers

451 search results - page 54 / 91
» P Systems and Topology: Some Suggestions for Research
Sort
View
CCS
2006
ACM
13 years 11 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ACSAC
2001
IEEE
13 years 11 months ago
Requirements for a General Framework for Response to Distributed Denial-of-Service
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can...
D. W. Gresty, Qi Shi, Madjid Merabti
ESCIENCE
2006
IEEE
13 years 11 months ago
Grid-Based Data Stream Processing in e-Science
The field of e-science currently faces many challenges. Among the most important ones are the analysis of huge volumes of scientific data and the connection of various sciences an...
Richard Kuntschke, Tobias Scholl, Sebastian Huber,...
HICSS
2009
IEEE
196views Biometrics» more  HICSS 2009»
14 years 2 months ago
Monetizing the Internet: Surely There Must be Something other than Advertising
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Eric K. Clemons
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 28 days ago
The Gender Factor in Virtual Reality Navigation and Wayfinding
An area of interest that remains to be more thoroughly investigated is that of human navigation and wayfinding in VR. This study attempted to examine the effect of gender on VR na...
Joaquin Vila, Barbara Beccue, Sachin Anandikar