Sciweavers

4049 search results - page 760 / 810
» Neural Network Trainer through Computer Networks
Sort
View
ISSRE
2005
IEEE
15 years 3 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
88
Voted
LCN
2005
IEEE
15 years 3 months ago
Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction
— An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-b...
Paal Engelstad, Olav N. Østerbø
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 3 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
WMTE
2005
IEEE
15 years 3 months ago
'Location is not enough!': an Empirical Study of Location-Awareness in Mobile Collaboration
: There is an ever growing number of mobile learning applications based on location-awareness, However, there is still a lack of information concerning how it might impact socio-co...
Nicolas Nova, Fabien Girardin, Pierre Dillenbourg
HT
2005
ACM
15 years 3 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver