Sciweavers

6014 search results - page 1107 / 1203
» Assembling Sensor Networks
Sort
View
SUTC
2006
IEEE
15 years 10 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
SUTC
2006
IEEE
15 years 10 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
SUTC
2006
IEEE
15 years 10 months ago
Transitive Nearest Neighbor Search in Mobile Environments
Given a query point p, typically the position of a current client, and two datasets S and R, a transitive nearest neighbor (TNN) search returns a pair of objects (s, r) ∈ S × R...
Baihua Zheng, Ken C. K. Lee, Wang-Chien Lee
CEC
2005
IEEE
15 years 10 months ago
Genetic programming approach for fault modeling of electronic hardware
This paper presents two variants of Genetic Programming (GP) approaches for intelligent online performance monitoring of electronic circuits and systems. Reliability modeling of el...
Ajith Abraham, Crina Grosan
« Prev « First page 1107 / 1203 Last » Next »