Sciweavers

5578 search results - page 973 / 1116
» Base Class Injection
Sort
View
152
Voted
CNSM
2010
15 years 19 days ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
165
Voted
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
15 years 19 days ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
141
Voted
FSTTCS
2010
Springer
15 years 18 days ago
First-Order Logic with Reachability Predicates on Infinite Systems
This paper focuses on first-order logic (FO) extended by reachability predicates such that the expressiveness and hence decidability properties lie between FO and monadic second-o...
Stefan Schulz
146
Voted
GLOBECOM
2010
IEEE
15 years 18 days ago
Optimal Bandwidth Allocation with Dynamic Service Selection in Heterogeneous Wireless Networks
Bandwidth allocation for different service classes in heterogeneous wireless networks is an important issue for service provider in terms of balancing service quality and profit. I...
Kun Zhu, Dusit Niyato, Ping Wang
ICCAD
2010
IEEE
158views Hardware» more  ICCAD 2010»
15 years 18 days ago
Novel binary linear programming for high performance clock mesh synthesis
Clock mesh is popular in high performance VLSI design because it is more robust against variations than clock tree at a cost of higher power consumption. In this paper, we propose ...
Minsik Cho, David Z. Pan, Ruchir Puri