Sciweavers

8655 search results - page 1320 / 1731
» Challenges for Trusted Computing
Sort
View
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 9 months ago
Open Source Enterprise Systems: Towards a Viable Alternative
Enterprise systems are located within the antinomy of appearing as generic product, while being means of multiple integrations for the user through configuration and customisation...
Alexander Dreiling, Helmut Klaus, Michael Rosemann...
ICDM
2005
IEEE
122views Data Mining» more  ICDM 2005»
15 years 9 months ago
Finding Representative Set from Massive Data
In the information age, data is pervasive. In some applications, data explosion is a significant phenomenon. The massive data volume poses challenges to both human users and comp...
Feng Pan, Wei Wang 0010, Anthony K. H. Tung, Jiong...
ICDM
2005
IEEE
150views Data Mining» more  ICDM 2005»
15 years 9 months ago
Combining Multiple Clusterings by Soft Correspondence
Combining multiple clusterings arises in various important data mining scenarios. However, finding a consensus clustering from multiple clusterings is a challenging task because ...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
ICITA
2005
IEEE
15 years 9 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ICNP
2005
IEEE
15 years 9 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
« Prev « First page 1320 / 1731 Last » Next »