Sciweavers

482 search results - page 81 / 97
» Proposal for compilation techniques of monitoring tasks to i...
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
DAWAK
1999
Springer
13 years 11 months ago
Implementation of Multidimensional Index Structures for Knowledge Discovery in Relational Databases
Efficient query processing is one of the basic needs for data mining algorithms. Clustering algorithms, association rule mining algorithms and OLAP tools all rely on efficient quer...
Stefan Berchtold, Christian Böhm, Hans-Peter ...
IEEECIT
2006
IEEE
14 years 1 months ago
One Update for all Moving Objects at a Timestamp
Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...
Hoang Do Thanh Tung, Keun Ho Ryu
WSC
2008
13 years 9 months ago
Distributed agent-based simulation of construction projects with HLA
Simulation techniques can provide a resource-driven schedule and answer many hypothetical scenarios before project execution to improve on conventional project management software...
Hosein Taghaddos, Simaan M. AbouRizk, Yasser Moham...
MVA
2007
211views Computer Vision» more  MVA 2007»
13 years 8 months ago
Vision-based UAV Navigation in Mountain Area
Most vision-based UAV (Unmanned Aerial Vehicle) navigation algorithms extract manmade features such as buildings or roads, which are well structured in urban terrain, using the CC...
Jihwan Woo, Kilho Son, Teng Li, Gwan Sung Kim, In-...