Sciweavers

10820 search results - page 2022 / 2164
» Understanding the
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
13 years 9 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
AIS
2006
Springer
13 years 9 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
ENGL
2008
95views more  ENGL 2008»
13 years 9 months ago
Formation of Sink Vortices in a Jet Engine Test Cell
Vortices can be produced and ingested into the intake of a jet engine during high power operation in the vicinity of solid surfaces causing Foreign Object Damage (FOD) or compresso...
Wei Hua Ho, Mark Jermy, Henry Dumbleton
ENVSOFT
2008
78views more  ENVSOFT 2008»
13 years 9 months ago
A general water supply planning model: Evaluation of decentralized treatment
Increasing population, diminishing supplies and variable climatic conditions can cause difficulties in meeting water demands; especially in arid regions where water resources are ...
G. Chung, K. Lansey, P. Blowers, P. Brooks, W. Ela...
BIB
2006
169views more  BIB 2006»
13 years 9 months ago
Bio-ontologies: current trends and future directions
: In recent years, as a knowledge-based discipline, bioinformatics has moved to make its knowledge more computationally amenable. After its beginnings in the disciplines as a techn...
Olivier Bodenreider, Robert Stevens
« Prev « First page 2022 / 2164 Last » Next »