Sciweavers

11215 search results - page 2178 / 2243
» Skeleton - Easy Simulation System
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
CIA
2004
Springer
14 years 3 months ago
Agent's Multiple Inquiries for Enhancing the Partnership Formation Process
The concept of sequential two-sided search is widely used in partnerships formation applications in various domains. However, when considering the implementation of the method in M...
David Sarne, Sarit Kraus
CIT
2004
Springer
14 years 3 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
EGH
2004
Springer
14 years 3 months ago
A programmable vertex shader with fixed-point SIMD datapath for low power wireless applications
The real time 3D graphics becomes one of the attractive applications for 3G wireless terminals although their battery lifetime and memory bandwidth limit the system resources for ...
Ju-Ho Sohn, Ramchan Woo, Hoi-Jun Yoo
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
14 years 3 months ago
A Pull-Based Approach for a VoD Service in P2P Networks
We study a new approach to provide an efficient VoD service to a large client population in P2P networks. Previous work has suggested to construct a multicast tree to distribute t...
Anwar Al Hamra, Ernst W. Biersack, Guillaume Urvoy...
« Prev « First page 2178 / 2243 Last » Next »