Sciweavers

6682 search results - page 1270 / 1337
» networks 2006
Sort
View
IJMMS
2006
100views more  IJMMS 2006»
13 years 10 months ago
A cognitive approach to user perception of multimedia quality: An empirical investigation
Whilst multimedia technology has been one of the main contributing factors behind the Web's success, delivery of personalised multimedia content has been a desire seldom achi...
Sherry Y. Chen, Gheorghita Ghinea, Robert D. Macre...
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 10 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
IJSN
2006
65views more  IJSN 2006»
13 years 10 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
IS
2006
13 years 10 months ago
Adaptive cycle management in soft real-time disk retrieval
The objective of this study is to determine the right cycle management policy to service periodic soft real-time disk retrieval. Cycle based disk scheduling provides an effective ...
Youjip Won, Ilhoon Shin, Kern Koh
ISCI
2006
145views more  ISCI 2006»
13 years 10 months ago
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network traffic data, and stock market. Data streams consist of mostly nume...
Aykut Ünal, Yücel Saygin, Özgü...
« Prev « First page 1270 / 1337 Last » Next »