Sciweavers

159 search results - page 20 / 32
» When to Trigger Active Rules
Sort
View
ACISP
2006
Springer
15 years 6 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
99
Voted
WOWMOM
2005
ACM
173views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Design and Evaluation of iMesh: An Infrastructure-Mode Wireless Mesh Network
Abstract— Wireless mesh networks are multihop networks of wireless routers typically used for wireless coverage over a large community. Applications include community-scale peer-...
Vishnu Navda, Anand Kashyap, Samir R. Das
WWW
2004
ACM
16 years 1 months ago
Composite events for xml
Recently, active behavior has received attention in the XML field to automatically react to occurred events. Aside from proprietary approaches for enriching XML with active behavi...
Martin Bernauer, Gerti Kappel, Gerhard Kramler
90
Voted
HT
1993
ACM
15 years 4 months ago
Links in Hypermedia: The Requirement for Context
Taking the concept of a link from hypertext and adding to it the rich collection of information formats found in multimedia systems provides an extension to hypertext that is ofte...
Lynda Hardman, Dick C. A. Bulterman, Guido van Ros...
107
Voted
NIPS
1997
15 years 2 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen