Sciweavers

10670 search results - page 2091 / 2134
» Required Information Release
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 11 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
ISCI
2008
166views more  ISCI 2008»
13 years 11 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
CONCURRENCY
2007
125views more  CONCURRENCY 2007»
13 years 11 months ago
VLab: collaborative Grid services and portals to support computational material science
: We present the initial architecture and implementation of VLab, a Grid and Web Service-based system for enabling distributed and collaborative computational chemistry and materia...
Mehmet A. Nacar, Mehmet S. Aktas, Marlon E. Pierce...
IVS
2008
145views more  IVS 2008»
13 years 11 months ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 11 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
« Prev « First page 2091 / 2134 Last » Next »