Sciweavers

AINA
2004
IEEE
14 years 13 days ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
AINA
2004
IEEE
14 years 13 days ago
A Mathematical Model for Analyzing the Proxy Bidding Method for Mobile Agent-Based Auction Services
This paper presents an auction system based on mobile agents. By using a proxy server, a user can generate a mobile auction agent by giving the bidding information, including the ...
Jie Zhang, Henry C. B. Chan
AINA
2004
IEEE
14 years 13 days ago
WKeeper: A Distributed Web Filtering System for IPv6 Home Networks
Chao-Ping Yu, Hsien-Wei Hung, Canaan Kao, Nen-Fu H...
AINA
2004
IEEE
14 years 13 days ago
A Web-Based Dual Mode Virtual Laboratory Supporting Cooperative Learning
This paper suggests the solution to build a Full Virtual Reality Learning Environment, and we have built both virtual and real laboratories on the web, in which students practice ...
Yu Lung Wu, Te Yi Chan, Bin Shyan Jong, Tsong Wuu ...
AINA
2004
IEEE
14 years 13 days ago
High-performance IPv4/IPv6 Dual-stack Routing Lookup
Zhen-Xing Wang, He-Ming Wang, Ya-Min Sun, Yan-Xiao...
AINA
2004
IEEE
14 years 13 days ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
AINA
2004
IEEE
14 years 13 days ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
AINA
2004
IEEE
14 years 13 days ago
Rich Metadata Searches Using the JXTA Content Manager Service
With the development of networking technologies and the advent of the peer-to-peer computing paradigm, distributed file-sharing systems like Gnutella are becoming prevalent over t...
Xin Xiang, Yuanchun Shi, Ling Guo
AINA
2004
IEEE
14 years 13 days ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
AINA
2004
IEEE
14 years 13 days ago
Distributed Logic Programming using Mobile Agents
Tzone I. Wang, Keith L. Clark