Sciweavers

228 search results - page 18 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
INEX
2004
Springer
14 years 23 days ago
TIJAH at INEX 2004 Modeling Phrases and Relevance Feedback
This paper discusses our participation in INEX using the TIJAH XML-IR system. We have enriched the TIJAH system, which follows a standard layered database architecture, with severa...
Vojkan Mihajlovic, Georgina Ramírez, Arjen ...
RTA
2007
Springer
14 years 1 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
COOPIS
2003
IEEE
14 years 21 days ago
Query Evaluation in Peer-to-Peer Networks of Taxonomy-Based Sources
We consider the problem of query evaluation in Peer-to-Peer (P2P) systems that support semantic-based retrieval services. We confine ourselves to the case where the peers employ t...
Yannis Tzitzikas, Carlo Meghini
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
JSAC
2007
263views more  JSAC 2007»
13 years 7 months ago
An Empirical Study of the Coolstreaming+ System
—In recent years, there has been significant interest in adopting the Peer-to-Peer (P2P) technology for Internet live video streaming. There are primarily two reasons behind thi...
Bo Li, Susu Xie, Gabriel Yik Keung, Jiangchuan Liu...