Sciweavers

28080 search results - page 5474 / 5616
» Multimedia Information Systems
Sort
View
WIMOB
2008
IEEE
15 years 8 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
113
Voted
ACSAC
2007
IEEE
15 years 8 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
ACSAC
2007
IEEE
15 years 8 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
138
Voted
BIBE
2007
IEEE
195views Bioinformatics» more  BIBE 2007»
15 years 8 months ago
Finding Clusters of Positive and Negative Coregulated Genes in Gene Expression Data
— In this paper, we propose a system for finding partial positive and negative coregulated gene clusters in microarray data. Genes are clustered together if they show the same p...
Kerstin Koch, Stefan Schönauer, Ivy Jansen, J...
GLOBECOM
2007
IEEE
15 years 8 months ago
A Measurement Study of Piece Population in BitTorrent
—BitTorrent is the most popular peer-to-peer software for file sharing, which has contributed to a significant portion of today’s Internet traffic. Many measurement studies ...
Cameron Dale, Jiangchuan Liu
« Prev « First page 5474 / 5616 Last » Next »