Sciweavers

1486 search results - page 237 / 298
» Firewall Rules Analysis
Sort
View
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
15 years 6 months ago
The Feature Importance Ranking Measure
Most accurate predictions are typically obtained by learning machines with complex feature spaces (as e.g. induced by kernels). Unfortunately, such decision rules are hardly access...
Alexander Zien, Nicole Krämer, Sören Son...
IPSN
2010
Springer
15 years 6 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu
ENC
2008
IEEE
15 years 6 months ago
Context-Aware Generation of User Interface Containers for Mobile Devices
—The world of the mobile devices involves restrictive features. Multiple efforts have been done to define the User Interface. Here, it is combined a neutral description of the UI...
Francisco J. Martínez-Ruiz, Jean Vanderdonc...
GLOBECOM
2008
IEEE
15 years 6 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
15 years 6 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang