Sciweavers

256 search results - page 16 / 52
» Reliable complex event detection for pervasive computing
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
ICIP
2004
IEEE
14 years 9 months ago
Efficient and reliable dynamic quality control for compression of compound document images
Compound images contain a mixture of natural images, text, and graphics. They need special care in the use of compression because text and graphics cannot withstand the significan...
Amir Said
MASCOTS
2010
13 years 9 months ago
Expanding the Event Horizon in Parallelized Network Simulations
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technolog...
Georg Kunz, Olaf Landsiedel, Stefan Götz, Kla...
ICDE
2010
IEEE
244views Database» more  ICDE 2010»
14 years 7 months ago
Reliable Storage and Querying for Collaborative Data Sharing Systems
The sciences, business confederations, and medicine urgently need infrastructure for sharing data and updates among collaborators' constantly changing, heterogeneous databases...
Nicholas E. Taylor, Zachary G. Ives
GI
2009
Springer
13 years 5 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...