Sciweavers

1143 search results - page 167 / 229
» Application Servers and Associated Technologies
Sort
View
WISEC
2009
ACM
15 years 6 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
IPPS
2008
IEEE
15 years 5 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
ICPADS
2006
IEEE
15 years 5 months ago
Oriented Overlays For Clustering Client Requests To Data-Centric Network Services
Many of the data-centric network services deployed today hold massive volumes of data at their origin websites, and access the data to dynamically generate responses to user reque...
Congchun He, Vijay Karamcheti
MIR
2005
ACM
176views Multimedia» more  MIR 2005»
15 years 4 months ago
Hybrid visual and conceptual image representation within active relevance feedback context
Many of the available image databases have keyword annotations associated with the images. In spite of the availability of good quality low-level visual features that reflect wel...
Marin Ferecatu, Nozha Boujemaa, Michel Crucianu
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
15 years 4 months ago
Evolving petri nets to represent metabolic pathways
Given concentrations of metabolites over a sequence of time steps, the metabolic pathway prediction problem seeks a set of reactions and rate constants for them that could yield t...
Jeremiah Nummela, Bryant A. Julstrom