Sciweavers

8655 search results - page 1338 / 1731
» Challenges for Trusted Computing
Sort
View
RAID
2004
Springer
15 years 9 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
SEMWEB
2004
Springer
15 years 9 months ago
Contexts for the Semantic Web
A central theme of the semantic web is that programs should be able to easily aggregate data from different sources. Unfortunately, even if two sites provide their data using the ...
Ramanathan V. Guha, Rob McCool, Richard Fikes
ICDS
2010
IEEE
15 years 9 months ago
Towards Learning Domain Ontology from Legacy Documents
—Learning ontology from text is a challenge in knowledge engineering research and practice. Learning relations between concepts is even more difficult work. However, when conside...
Yijian Wu, Shaolei Zhang, Wenyun Zhao
EUROSEC
2010
ACM
15 years 9 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ASAP
2003
IEEE
114views Hardware» more  ASAP 2003»
15 years 9 months ago
An Efficient Disk-Array-Based Server Design for a Multicast Video Streaming System
Recently, a number of researchers have started to investigate new video-on-demand (VoD) architectures using batching, patching and periodic broadcasting. These architectures, comp...
P. H. Chan Patton, Jack Y. B. Lee
« Prev « First page 1338 / 1731 Last » Next »