Sciweavers

1183 search results - page 236 / 237
» Exploiting Conceptual Knowledge for Querying Information Sys...
Sort
View
ADHOCNOW
2004
Springer
13 years 11 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
CCS
2003
ACM
13 years 11 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
HUC
2003
Springer
13 years 11 months ago
Finding a Place for UbiComp in the Home
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous computing might relate to and supp...
Andy Crabtree, Tom Rodden, Terry Hemmings, Steve B...
ECCV
1992
Springer
13 years 10 months ago
Data and Model-Driven Selection using Color Regions
A key problem in model-based object recognition is selection, namely, the problem of determining which regions in the image are likely to come from a single object. In this paper w...
Tanveer Fathima Syeda-Mahmood
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 7 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen