Sciweavers

2200 search results - page 349 / 440
» Hop Integrity in Computer Networks
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 3 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
TGIS
2002
118views more  TGIS 2002»
15 years 2 months ago
A Dynamic Architecture for Distributing Geographic Information Services
Traditional GISystems are no longer appropriate for modern distributed, heterogeneous network environments due to their closed architecture, and their lack of interoperability, reu...
Ming-Hsiang Tsou, Barbara P. Buttenfield
PERCOM
2010
ACM
15 years 1 months ago
Web services on embedded systems - a performance study
Abstract—A platform-independent communication mechanism is essential for the seamless integration of embedded devices into the Web of Things. Web services provide for such commun...
Christin Groba, Siobhán Clarke
WS
2010
ACM
15 years 1 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
JDCTA
2010
95views more  JDCTA 2010»
14 years 10 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang