Sciweavers

3785 search results - page 702 / 757
» Immune System Based Intrusion Detection System
Sort
View
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 6 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 6 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
DBPL
2007
Springer
136views Database» more  DBPL 2007»
15 years 6 months ago
Analysis of Imperative XML Programs
The widespread adoption of XML has led to programming languages that support XML as a first class construct. In this paper, we present a method for analyzing and optimizing impera...
Michael G. Burke, Igor Peshansky, Mukund Raghavach...
ICMCS
2006
IEEE
182views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Using Semantic Features for Scene Classification: how Good do they Need to Be?
Semantic scene classification is a useful, yet challenging problem in image understanding. Most existing systems are based on low-level features, such as color or texture, and suc...
Matthew R. Boutell, Anustup Choudhury, Jiebo Luo, ...
UIST
2006
ACM
15 years 5 months ago
Interactive environment-aware display bubbles
Interactive environment-aware display bubbles have been introduced in a novel display metaphor [3] which allows screens to be instantiated with a freeform shape anywhere on demand...
Daniel Cotting, Markus H. Gross