Sciweavers

511 search results - page 102 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
13 years 11 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
MOBISYS
2007
ACM
14 years 4 months ago
MobiUS: enable together-viewing video experience across two mobile devices
We envision a new better-together mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific together-viewing video application...
Guobin Shen, Yanlin Li, Yongguang Zhang
MOBISYS
2007
ACM
14 years 4 months ago
Context browsing with mobiles - when less is more
Except for a handful of "mobile" Web sites, the Web is designed for browsing with personal computers with large screens capable of fitting the content of most Web pages....
Yevgen Borodin, Jalal Mahmud, I. V. Ramakrishnan
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
13 years 11 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
13 years 11 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...