Sciweavers

8499 search results - page 1696 / 1700
» networking 2007
Sort
View
IEICET
2007
93views more  IEICET 2007»
13 years 10 months ago
Experimental Evaluation of Decision Criteria for WLAN Handover: Signal Strength and Frame Retransmission
Abstract. In ubiquitous networks, Mobile Nodes (MNs) may often suffer from performance degradation due to the following two reasons: (1) reduction of signal strength by an MN’s m...
Kazuya Tsukamoto, Takeshi Yamaguchi, Shigeru Kashi...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 10 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IJWIS
2007
181views more  IJWIS 2007»
13 years 10 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
INFFUS
2007
107views more  INFFUS 2007»
13 years 10 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
JAIR
2007
120views more  JAIR 2007»
13 years 10 months ago
An Algebraic Graphical Model for Decision with Uncertainties, Feasibilities, and Utilities
Numerous formalisms and dedicated algorithms have been designed in the last decades to model and solve decision making problems. Some formalisms, such as constraint networks, can ...
Cédric Pralet, Gérard Verfaillie, Th...
« Prev « First page 1696 / 1700 Last » Next »