Sciweavers

1244 search results - page 240 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 24 days ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
BMCBI
2004
174views more  BMCBI 2004»
14 years 11 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar
MONET
2002
143views more  MONET 2002»
14 years 11 months ago
P-MIP: Paging Extensions for Mobile IP
As the number of Mobile IP users grows, so will the signalling overhead associated with Internet mobility management in the core IP network. This presents a significant challenge t...
Xiaowei Zhang, Javier Gomez Castellanos, Andrew T....
MOBICOM
2006
ACM
15 years 5 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...
103
Voted
MOBISYS
2008
ACM
15 years 11 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...