Sciweavers

1936 search results - page 217 / 388
» Unbundling Active Functionality
Sort
View
ISNN
2005
Springer
15 years 9 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
OTM
2005
Springer
15 years 9 months ago
Event Broker Grids with Filtering, Aggregation, and Correlation for Wireless Sensor Data
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Eiko Yoneki
TRUSTBUS
2005
Springer
15 years 9 months ago
Privacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Hannes Federrath
TRUSTBUS
2005
Springer
15 years 9 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
ATAL
2004
Springer
15 years 9 months ago
When to Apply the Fifth Commandment: The Effects of Parenting on Genetic and Learning Agents
This paper explores hybrid agents that use a variety of techniques to improve their performance in an environment over time. We considered, specifically, geneticlearning-parentin...
Michael Berger, Jeffrey S. Rosenschein