Sciweavers

1329 search results - page 190 / 266
» Models and solution techniques for frequency assignment prob...
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 3 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
ENTCS
2006
139views more  ENTCS 2006»
15 years 3 months ago
Improving the Usability of a Graph Transformation Language
Model transformation tools implemented using graph transformation techniques are often expected to provide high performance. For this reason, in the Graph Rewriting and Transforma...
Attila Vizhanyo, Sandeep Neema, Feng Shi, Daniel B...
MTA
2000
108views more  MTA 2000»
15 years 3 months ago
Towards A New Authoring Methodology for Large-Scale Hypermedia Applications
As the amount of information technology increases, managing information resources, so that the correct people can find the information easily, becomes a critical issue. Hypermedia...
Ian Heath, Gary Wills, Richard Crowder, Wendy Hall...
ICDCS
2007
IEEE
15 years 9 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
CORR
2010
Springer
170views Education» more  CORR 2010»
15 years 3 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...