Sciweavers

7271 search results - page 1334 / 1455
» The high performance storage system
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
CN
1999
98views more  CN 1999»
13 years 7 months ago
Mobility information for resource management in wireless ATM networks
ZUser mobility poses a significant technical challenge to network resource management in wireless ATM Asynchronous . Z .Transfer Mode networks. In order to guarantee quality of se...
Xuemin Shen, Jon W. Mark
UIC
2010
Springer
13 years 6 months ago
Smart Itinerary Recommendation Based on User-Generated GPS Trajectories
Traveling to unfamiliar regions require a significant effort from novice travelers to plan where to go within a limited duration. In this paper, we propose a smart recommendation...
Hyoseok Yoon, Yu Zheng, Xing Xie, Woontack Woo
KI
2010
Springer
13 years 5 months ago
Local Adaptive Extraction of References
Abstract. The accurate extraction of scholarly reference information from scientific publications is essential for many useful applications like BIBTEX management systems or citati...
Peter Klügl, Andreas Hotho, Frank Puppe
MACOM
2010
13 years 5 months ago
Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks
Abstract. In wireless ad hoc networks, cross-layer design aims at reducing multiple access interference and thus obtaining a higher spatial reuse. In order to identify the most sui...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
« Prev « First page 1334 / 1455 Last » Next »