Sciweavers

23406 search results - page 4642 / 4682
» Architecture, Design, Implementation
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 10 months ago
Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification
Message Sequence Charts (MSCs) are an appealing visual formalism mainly used in the early stages of system design to capture the system requirements. However, if we move towards a...
Kamrul Hasan Talukder
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 10 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
EC
2010
157views ECommerce» more  EC 2010»
14 years 10 months ago
Memetic Algorithms for Continuous Optimisation Based on Local Search Chains
Memetic algorithms with continuous local search methods have arisen as effective tools to address the difficulty of obtaining reliable solutions of high precision for complex cont...
Daniel Molina, Manuel Lozano, Carlos García...
DSS
2008
186views more  DSS 2008»
14 years 10 months ago
A machine learning approach to web page filtering using content and structure analysis
As the Web continues to grow, it has become increasingly difficult to search for relevant information using traditional search engines. Topic-specific search engines provide an al...
Michael Chau, Hsinchun Chen
AHSWN
2006
206views more  AHSWN 2006»
14 years 10 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
« Prev « First page 4642 / 4682 Last » Next »