Sciweavers

2030 search results - page 59 / 406
» The Need for Customizable Operating Systems
Sort
View
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IJIPT
2007
111views more  IJIPT 2007»
15 years 4 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss
GCC
2003
Springer
15 years 9 months ago
Component-Based Middleware Platform for Grid Computing
: In the Grid environment, user can manage and make use of web services, such as uploading or downloading web services. But when user want to download one web services to run it in...
Jianmin Zhu, Rong Chen, Guangnan Ni, Yuan Liu
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
15 years 9 months ago
Architecture of a Mobile Internet
In this paper, we outline the next major evolution of the Internet architecture, where support for mobility is not the exception but the typical case. We show which parts of the I...
Dick Schefström
HOTI
2008
IEEE
15 years 11 months ago
HPP Switch: A Novel High Performance Switch for HPC
The high performance switch plays a critical role in the high performance computer (HPC) system. The applications of HPC not only demand on the low latency and high bandwidth of t...
Dawei Wang, Zheng Cao, Xinchun Liu, Ninghui Sun