Sciweavers

2978 search results - page 446 / 596
» Operations Research
Sort
View
135
Voted
IJNSEC
2008
137views more  IJNSEC 2008»
15 years 3 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
IJRR
2008
242views more  IJRR 2008»
15 years 3 months ago
Bilateral Symmetry Detection for Real-time Robotics Applications
Bilateral symmetry is a salient visual feature of many man-made objects. In this paper, we present research that use bilateral symmetry to identify, segment and track objects in re...
Wai Ho Li, Alan M. Zhang, Lindsay Kleeman
142
Voted
IJAHUC
2006
128views more  IJAHUC 2006»
15 years 3 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
IPM
2008
114views more  IPM 2008»
15 years 3 months ago
User-assisted query translation for interactive cross-language information retrieval
Interactive Cross-Language Information Retrieval (CLIR), a process in which searcher and system collaborate to find documents that satisfy an information need regardless of the la...
Douglas W. Oard, Daqing He, Jianqiang Wang
139
Voted
COMSIS
2007
80views more  COMSIS 2007»
15 years 3 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...