Sciweavers

13717 search results - page 2735 / 2744
» Control Systems
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
UIST
2010
ACM
14 years 7 months ago
Multitoe: high-precision interaction with back-projected floors based on high-resolution multi-touch input
Tabletop applications cannot display more than a few dozen on-screen objects. The reason is their limited size: tables cannot become larger than arm's length without giving u...
Thomas Augsten, Konstantin Kaefer, René Meu...
CCECE
2009
IEEE
14 years 7 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron
ESIAT
2009
IEEE
14 years 7 months ago
Experimental Study on Shortcut Nitrification of Sewage from Flushing Toilet with Seawater
Shortcut nitrification was reported to be technically feasible and economically favourable, especially when sewages with high ammonium concentrations or low C/N ratios are treated....
Xiaojie Sun, Yingjie Sun, Hongtao Wang, Deshuang Y...
ICWSM
2009
14 years 7 months ago
Gesundheit! Modeling Contagion through Facebook News Feed
Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
« Prev « First page 2735 / 2744 Last » Next »