Sciweavers

Share
AINA
2010
IEEE
9 years 21 days ago
YASA-M: A Semantic Web Service Matchmaker
Abstract--In this paper, we present new algorithms for matching Web services described in YASA4WSDL (YASA for short). We have already defined YASA that overcomes some issues missin...
Yassin Chabeb, Samir Tata, Alain Ozanne
AINA
2010
IEEE
9 years 24 days ago
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Abstract—We propose PRoPHET+, a routing scheme for opportunistic networks designed to maximize successful data delivery rate and minimize transmission delay. PRoPHET+ computes a ...
Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
AINA
2010
IEEE
9 years 24 days ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
AINA
2010
IEEE
9 years 24 days ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
AINA
2010
IEEE
9 years 1 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
AINA
2010
IEEE
9 years 1 months ago
A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks
One important challenge in wireless ad hoc networks is to achieve collision free communication. Many MAC layer protocols have been proposed by considering various communication mod...
Bezawada Bruhadeshwar, Kishore Kothapalli, Indira ...
AINA
2010
IEEE
9 years 1 months ago
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems
One of the major premises of P2P systems is to enable fully decentralized collaborative functionalities for supporting work teams and P2P communities. Within collaborative systems,...
Fatos Xhafa, Alex Poulovassilis
AINA
2010
IEEE
9 years 2 months ago
The Power of Orientation in Symmetry-Breaking
—Symmetry breaking is a fundamental operation in distributed computing. It has applications to important problems such as graph vertex and edge coloring, maximal independent sets...
Satya Krishna Pindiproli, Kishore Kothapalli
AINA
2010
IEEE
9 years 2 months ago
Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study
—In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as Mobile Offshore Drilling Units. In a typical in...
Alvin C. Valera, Hwee Pink Tan, Xiaoping Ma
AINA
2010
IEEE
9 years 2 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
books