Sciweavers

Share
ICYCS
2008
IEEE
9 years 6 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
ICYCS
2008
IEEE
9 years 6 months ago
FAST CASH: FAir and STable Channel ASsignment on Heterogeneous Wireless Mesh Network
— Nowadays wireless mesh routers are facilitating with more wireless channels than ever because of the advanced wireless communication technologies such as OFDM, SDR and CR(cogni...
Panlong Yang, Guihai Chen
ICYCS
2008
IEEE
9 years 6 months ago
Sound-Specific Vibration Interface: Its Performance of Tactile Effects and Applications
The tactile effects of a sound-specific vibration interface is presented in this paper. The sound-specific vibration interface generates a vibration according to a sound stream us...
Yonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo...
ICYCS
2008
IEEE
9 years 6 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
ICYCS
2008
IEEE
9 years 6 months ago
DSmT Qualitative Reasoning based on 2-Tuple Linguistic Representation Model
Most of modern systems for information retrieval, fusion and management have to deal more and more with information expressed quatitatively (by linguistic labels) since human repo...
Xinde Li, Xianzhong Dai, Jean Dezert, Florentin Sm...
ICYCS
2008
IEEE
9 years 6 months ago
Trustworthiness and Quality of Context Information
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasonin...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ICYCS
2008
IEEE
9 years 6 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...
ICYCS
2008
IEEE
9 years 6 months ago
Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed Environments
In 21 century, an era of information and internet, it is essential for universities to develop their education in order to be focused. Testing online has unparalleled advantages i...
Qing Wu, Wen Ding, Weihua Hu, Bishui Zhou, Tianzho...
ICYCS
2008
IEEE
9 years 6 months ago
VM-based Architecture for Network Monitoring and Analysis
A single physical machine provides multiple network monitoring and analysis services (e.g., IDS, QoS) which are installed on the same operating system. Isolation between services ...
Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li
books