Sciweavers

12052 search results - page 1994 / 2411
» computing 2010
Sort
View
AINA
2010
IEEE
15 years 9 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
AINA
2010
IEEE
15 years 9 months ago
Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study
—In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as Mobile Offshore Drilling Units. In a typical in...
Alvin C. Valera, Hwee Pink Tan, Xiaoping Ma
ICDE
2010
IEEE
206views Database» more  ICDE 2010»
15 years 9 months ago
Evaluating skylines in the presence of equijoins
— When a database system is extended with the skyline operator, it is important to determine the most efficient way to execute a skyline query across tables with join operations...
Wen Jin, Michael D. Morse, Jignesh M. Patel, Marti...
CHI
2010
ACM
15 years 9 months ago
What's your idea?: a case study of a grassroots innovation pipeline within a large software company
Establishing a grassroots innovation pipeline has come to the fore as strategy for nurturing innovation within large organizations. A key element of such pipelines is the use of a...
Brian P. Bailey, Eric Horvitz
SACMAT
2010
ACM
15 years 9 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
« Prev « First page 1994 / 2411 Last » Next »