Sciweavers

7544 search results - page 1365 / 1509
» Network Forensics Analysis
Sort
View
HPCC
2007
Springer
15 years 8 months ago
FTSCP: An Efficient Distributed Fault-Tolerant Service Composition Protocol for MANETs
Abstract. Service composition, which enables users to construct complex services from atomic services, is an essential feature for the usability of Mobile Ad hoc Networks (MANETs)....
Zhen-guo Gao, Sheng Liu, Ming Ji, Jinhua Zhao, Lih...
HT
2007
ACM
15 years 8 months ago
Identifying subcommunities using cohesive subgroups in social hypertext
Web pages can be modeled as nodes in a social network, and hyperlinks between pages form links (relationships) between the nodes. Links may take the form of comments, for example ...
Alvin Chin, Mark H. Chignell
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 8 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
AMT
2006
Springer
107views Multimedia» more  AMT 2006»
15 years 8 months ago
An Intelligent Process Monitoring System in Complex Manufacturing Environment
In high-tech industries, most manufacturing processes are complexly intertwined, in that manufacturers or engineers can hardly control a whole set of processes. They are only capa...
Sung Ho Ha, Boo-Sik Kang
« Prev « First page 1365 / 1509 Last » Next »