Sciweavers

8220 search results - page 1546 / 1644
» Querying XML Data
Sort
View
KIVS
2005
Springer
14 years 1 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
PET
2005
Springer
14 years 1 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
PKDD
2005
Springer
89views Data Mining» more  PKDD 2005»
14 years 1 months ago
Community Mining from Multi-relational Networks
Abstract. Social network analysis has attracted much attention in recent years. Community mining is one of the major directions in social network analysis. Most of the existing met...
Deng Cai, Zheng Shao, Xiaofei He, Xifeng Yan, Jiaw...
TES
2005
Springer
14 years 1 months ago
Bootstrapping Domain Ontology for Semantic Web Services from Source Web Sites
The vision of Semantic Web services promises a network of interoperable Web services over different sources. A major challenge to the realization of this vision is the lack of aut...
Wensheng Wu, AnHai Doan, Clement T. Yu, Weiyi Meng
VIZSEC
2005
Springer
14 years 1 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
« Prev « First page 1546 / 1644 Last » Next »