Sciweavers

13500 search results - page 2609 / 2700
» Improved analysis of D
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
BIBE
2007
IEEE
162views Bioinformatics» more  BIBE 2007»
15 years 4 months ago
An Investigation into the Feasibility of Detecting Microscopic Disease Using Machine Learning
— The prognosis for many cancers could be improved dramatically if they could be detected while still at the microscopic disease stage. We are investigating the possibility of de...
Mary Qu Yang, Jack Y. Yang
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 4 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
94
Voted
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
Hierarchical and Breathing Peer-to-Peer SIP System
—The combination of the SIP-based service and Peer-to-Peer (P2P) can improve the performance of traditional client-server SIP system. However, current P2P SIP systems have many d...
Lifeng Le, Geng-Sheng Kuo
ICNS
2007
IEEE
15 years 4 months ago
IGMPS, a New Tool for Estimating End-to-End Available Bandwidth in IP Network Paths
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
Ahmed Ait Ali, Francis Lepage
« Prev « First page 2609 / 2700 Last » Next »