Sciweavers

1995 search results - page 331 / 399
» From Data Flow Networks to Process Algebras
Sort
View
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 4 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
RTCSA
2005
IEEE
15 years 3 months ago
LyraNET: A Zero-Copy TCP/IP Protocol Stack for Embedded Operating Systems
Embedded systems are usually resource limited in terms of processing power, memory, and power consumption, thus embedded TCP/IP should be designed to make the best use of limited ...
Yun-Chen Li, Mei-Ling Chiang
IWMMDBMS
1998
139views more  IWMMDBMS 1998»
14 years 11 months ago
Fusion of Multimedia Information
: In recent years the fusion of multimedia information from multiple real-time sources and databases has become increasingly important because of its practical significance in many...
Shi-Kuo Chang, Taieb Znati
ESCIENCE
2006
IEEE
15 years 3 months ago
Workflow-Driven Ontologies: An Earth Sciences Case Study
A goal of the Geosciences Network (GEON) is to develop cyber-infrastructure that will allow earth scientists to discover access, integrate and disseminate knowledge in distributed...
Leonardo Salayandia, Paulo Pinheiro da Silva, Ann ...