Sciweavers

481 search results - page 39 / 97
» An Approach to Behavior Sharing in Federated Database System...
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
SC
2003
ACM
15 years 3 months ago
Remote Visualization by Browsing Image Based Databases with Logistical Networking
The need to provide remote visualization of large datasets with adequate levels of quality and interactivity has become a major impediment to distributed collaboration in Computat...
Jin Ding, Jian Huang, Micah Beck, Shaotao Liu, Ter...
ICCCI
2010
Springer
14 years 8 months ago
Strategic Health Information Management and Forecast: The Birdwatching Approach
Abstract. To facilitate communication and the exchange of information between patients, nurses, lab technicians, health insurers, physicians, policy makers, and existing knowledge-...
Arash Shaban-Nejad, Volker Haarslev
190
Voted
GIS
2003
ACM
15 years 11 months ago
Processing in-route nearest neighbor queries: a comparison of alternative approaches
Nearest neighbor query is one of the most important operations in spatial databases and their application domains, e.g., locationbased services, advanced traveler information syst...
Shashi Shekhar, Jin Soung Yoo
SAC
2003
ACM
15 years 3 months ago
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration
This paper presents flexible protocols for dynamic database design and reconfiguration, enabling mobile database to be designed in such a way that data location, replication and e...
Yanli Xia, Abdelsalam Helal