Sciweavers

13224 search results - page 2434 / 2645
» Self-monitoring for Computer Users
Sort
View
IFIP8
2004
13 years 9 months ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 9 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
ISCAPDCS
2004
13 years 9 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
DMDW
2003
269views Management» more  DMDW 2003»
13 years 9 months ago
CASME: A CASE Tool for Spatial Data Marts Design and Generation
Geographic Information Systems (GIS) showed their insufficiencies in front of complex requests for decision-makers. Resulting of the association of the databases and the decision-m...
Hajer Baazaoui Zghal, Sami Faïz, Henda Hajjam...
IWPT
2001
13 years 9 months ago
Automatic Grammar Partitioning for Syntactic Parsing
Natural language processing technologies offer ease-of-use of computers for average users, and easeof-access to on-line information. Natural language, however, is complex, and the...
Po-Chui Luk, Fuliang Weng, Helen Meng
« Prev « First page 2434 / 2645 Last » Next »