Sciweavers

3544 search results - page 553 / 709
» Information Security in Open Systems
Sort
View
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 9 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 2 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
MM
2009
ACM
138views Multimedia» more  MM 2009»
15 years 5 months ago
WOW: wild-open warning for broadcast basketball video based on player trajectory
In basketball games, wild-open means that there is an offensive player not well defended by his/her opponents. The occurrence of wild-open usually implies the existence of a succe...
Ming-Hsiu Chang, Ming-Chun Tien, Ja-Ling Wu
EDOC
2007
IEEE
15 years 5 months ago
Survey of Traceability Approaches in Model-Driven Engineering
Models have been used in various engineering fields to help managing complexity and represent information in difbstraction levels, according to specific notations and stakeholde...
Ismênia Galvão, Arda Goknil
PRDC
2007
IEEE
15 years 5 months ago
Implementation of Highly Available OSPF Router on ATCA
This paper proposes a Highly-Available Open Shortest Path First (HA-OSPF) router which consists of two OSPF router modules-active and standby-to support a highavailability network...
Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yua...