Sciweavers

3077 search results - page 466 / 616
» Research issues
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 5 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
IJRR
2008
98views more  IJRR 2008»
15 years 5 months ago
Automatic Configuration Recognition Methods in Modular Robots
Recognizing useful modular robot configurations composed of hundreds of modules is a significant challenge. Matching a new modular robot configuration to a library of known configu...
Michael Park, Sachin Chitta, Alex Teichman, Mark Y...
IIE
2006
108views more  IIE 2006»
15 years 5 months ago
Towards the Information Society - the Case of Finnnish Teacher Education
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
Johani Rautopuro, Susanna Pöntinen, Jari Kukk...
IJBC
2006
93views more  IJBC 2006»
15 years 5 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
COMCOM
2007
94views more  COMCOM 2007»
15 years 5 months ago
Distributed inter-domain lightpath provisioning in the presence of wavelength conversion
Dense wavelength division multiplexing (DWDM) has become the dominant transport layer technology for next-generation backbone networks due to its unprecedented capacity scalabilit...
Qing Liu, Nasir Ghani, Nageswara S. V. Rao, Ashwin...