Sciweavers

6682 search results - page 1273 / 1337
» networks 2006
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 10 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
CUZA
2002
130views more  CUZA 2002»
13 years 9 months ago
Distributed Threads in Java
In this paper we present a mechanism for serializing the execution-state of a distributed Java application that is implemented on a conventional Object Request Broker (ORB) archite...
Danny Weyns, Eddy Truyen, Pierre Verbaeten
IJPRAI
2000
62views more  IJPRAI 2000»
13 years 9 months ago
Knowledge-Guided Classification of Coastal Zone Color Images Off the West Florida Shelf
Abstract A knowledge-guided approach to automatic classification of Coastal Zone Color images of the West Florida Shelf is described. The approach is used to identify red tides on ...
Mingrui Zhang, Lawrence O. Hall, Dmitry B. Goldgof...
KAIS
2000
139views more  KAIS 2000»
13 years 9 months ago
Incremental View Maintenance for Mobile Databases
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the ...
Ken C. K. Lee, Hong Va Leong, Antonio Si
ETT
2002
89views Education» more  ETT 2002»
13 years 9 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
« Prev « First page 1273 / 1337 Last » Next »