Sciweavers

488 search results - page 90 / 98
» REDUCE Meets CAMAL
Sort
View
IJIQ
2008
107views more  IJIQ 2008»
13 years 6 months ago
Extending the boundaries of IQ: Can collaboration with information management improve corporate governance
: The increase in the volume of information be handled by organisations has increased pressure on corporate boards to ensure that legislative, accountability, business and cultural...
Heather Maguire
IJNSEC
2008
72views more  IJNSEC 2008»
13 years 6 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
CN
2007
106views more  CN 2007»
13 years 6 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 6 months ago
Algebraic Distributed Space-Time Codes with Low ML Decoding Complexity
— ”Extended Clifford algebras” are introduced as a means to obtain low ML decoding complexity space-time block codes. Using left regular matrix representations of two speci...
G. Susinder Rajan, B. Sundar Rajan
JSAC
2006
172views more  JSAC 2006»
13 years 6 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu