Sciweavers

552 search results - page 80 / 111
» Convergence and Next Generation Networks
Sort
View
100
Voted
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
16 years 19 days ago
TelegraphCQ: Continuous Dataflow Processing
Increasingly pervasive networks are leading towards a world where data is constantly in motion. In such a world, conventional techniques for query processing, which were developed...
Sirish Chandrasekaran, Owen Cooper, Amol Deshpande...
96
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
96
Voted
WSC
2007
15 years 2 months ago
Visualization techniques utilizing the sensitivity analysis of models
Models of real world systems are being increasingly generated from data that describes the behaviour of systems. Data mining techniques, such as Artificial Neural Networks (ANN),...
Ivo Kondapaneni, Pavel Kordík, Pavel Slav&i...
84
Voted
IJNSEC
2007
108views more  IJNSEC 2007»
15 years 12 days ago
Mobility Management with Distributed AAA Architecture
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
IEICET
2007
142views more  IEICET 2007»
15 years 8 days ago
Detecting Unknown Worms Using Randomness Check
From the appearance of CodeRed and SQL Slammer worm, we have learned that the early detection of worm epidemics is important to reduce the damage caused by their outbreak. One prom...
Hyundo Park, Heejo Lee, Hyogon Kim