Sciweavers

1709 search results - page 49 / 342
» An active network approach to virtual private networks
Sort
View
IJCAI
2007
15 years 3 months ago
Word Sense Disambiguation with Spreading Activation Networks Generated from Thesauri
Most word sense disambiguation (WSD) methods require large quantities of manually annotated training data and/or do not exploit fully the semantic relations of thesauri. We propos...
George Tsatsaronis, Michalis Vazirgiannis, Ion And...
CN
2006
85views more  CN 2006»
15 years 1 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...
SEMWEB
2007
Springer
15 years 8 months ago
An Ontology-based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
Clinical Practice Guidelines (CPGs) play an important role in improving the quality of care and patient outcomes. Although several machine-readable representations of practice guid...
Hai-Tao Zheng, Bo-Yeong Kang, Hong-Gee Kim
ISI
2008
Springer
15 years 1 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....

Lecture Notes
404views
16 years 12 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain