Sciweavers

24 search results - page 5 / 5
» A p2p based service flow system with advanced ontology-based...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
HPCA
2006
IEEE
14 years 10 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
ER
1997
Springer
145views Database» more  ER 1997»
14 years 2 months ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli
ICALT
2006
IEEE
14 years 3 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk