Sciweavers

27756 search results - page 5514 / 5552
» Process Query Systems
Sort
View
EXPERT
2006
84views more  EXPERT 2006»
13 years 7 months ago
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
abstraction rules that hide the complexity of systems of components. We've begun this process in the domain of sensor/actuator network applications, observing that in manyappl...
Jacob Beal, Jonathan Bachrach
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 7 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
CN
2007
89views more  CN 2007»
13 years 7 months ago
Determining an appropriate sending rate over an underutilized network path
Determining an appropriate sending rate when beginning data transmission into a network with unknown characteristics is a fundamental issue in best-effort networks. Traditionally,...
Pasi Sarolahti, Mark Allman, Sally Floyd
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JAIR
2008
164views more  JAIR 2008»
13 years 7 months ago
Gesture Salience as a Hidden Variable for Coreference Resolution and Keyframe Extraction
Gesture is a non-verbal modality that can contribute crucial information to the understanding of natural language. But not all gestures are informative, and non-communicative hand...
Jacob Eisenstein, Regina Barzilay, Randall Davis
« Prev « First page 5514 / 5552 Last » Next »