Sciweavers

906 search results - page 141 / 182
» Linking Theories of Concurrency
Sort
View
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
GLOBECOM
2006
IEEE
15 years 3 months ago
Hierarchical Iterative Algorithm for a Coupled Constrained OSNR Nash Game
— This paper develops a hierarchical iterative OSNR algorithm based on a game theory framework. A Nash game is formulated between channels with channel utility related to maximiz...
Lacra Pavel
IAT
2006
IEEE
15 years 3 months ago
Storytelling Ontology Model Using RST
Storytelling applications are increasingly being used and researched due to the fact that they are capable of conveying information and experience to users in a more natural and f...
Arturo Nakasone, Mitsuru Ishizuka
ICARCV
2006
IEEE
126views Robotics» more  ICARCV 2006»
15 years 3 months ago
Developments in Snake Robot Modeling and Locomotion
— Snake robots may one day play a crucial role in search and rescue operations and fire-fighting where it may either be too narrow or to dangerous for personnel to operate. Pro...
Aksel Andreas Transeth, Kristin Ytterstad Petterse...
JCDL
2006
ACM
172views Education» more  JCDL 2006»
15 years 3 months ago
A comprehensive comparison study of document clustering for a biomedical digital library MEDLINE
Document clustering has been used for better document retrieval, document browsing, and text mining in digital library. In this paper, we perform a comprehensive comparison study ...
Illhoi Yoo, Xiaohua Hu