Sciweavers

14824 search results - page 2563 / 2965
» Security - Introduction
Sort
View
IWCMC
2006
ACM
15 years 9 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
ML
2006
ACM
15 years 9 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 9 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
« Prev « First page 2563 / 2965 Last » Next »