![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
102 Result(s)
-
Chapter and Conference Paper
A Framework for Background Detection in Video
This paper presents a framework for background detection in video. First, key frames are extracted to capture background change in video and reduce the magnitude of the data. Then we analyze the content of the...
-
Chapter and Conference Paper
A Gravity-Based Intrusion Detection Method
It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...
-
Chapter and Conference Paper
Mining Maximal Frequent Itemsets for Intrusion Detection
It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...
-
Chapter and Conference Paper
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalogue. In the computational Gri...
-
Chapter and Conference Paper
Coarse-Grained Distributed Parallel Programming Interface for Grid Computing
In this paper, a practical coarse-grained distributed parallel programming interface for grid computing (PI4GC) is introduced. It provides a group of generic and abstract function prototypes with well-specifie...
-
Article
New approach to WLAN security with synchronized pseudo random
Wireless transmission is becoming increasing ubiquitous, but there is a big black hole in the security of this kind of network. Although IEEE 802.11 provides an optionalWired Equivalent Privacy (WEP), to implemen...
-
Article
Extracting frequent connected subgraphs from large graph sets
Mining frequent patterns from datasets is one of the key success of data mining research. Currently, most of the studies focus on the data sets in which the elements are independent, such as the items in the m...
-
Chapter and Conference Paper
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers
In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, w...
-
Chapter and Conference Paper
Designing Adaptive PI Algorithm Based on Single Neuron
PI is a newly proposed Active Queue Management algorithm that has many important applications. But in case of heavy congestion its response is sluggish, and because of its static parameter’s setting PI is sens...
-
Chapter and Conference Paper
A Hybrid Approach to Detect Adult Web Images
This paper presents a hybrid approach to discriminate benign images from adult images. Different from previously published works, our approach combines face detection and adaptive skin detection. First, face d...
-
Chapter and Conference Paper
What Can Expressive Semantics Tell: Retrieval Model for a Flash-Movie Search Engine
Flash, as a multimedia format, becomes more and more popular on the Web. However, previous works on Flash are unpractical to build a content-based Flash search engine. To address this problem, our paper propos...
-
Chapter and Conference Paper
Virtual Biology Modeling Method Based on Validity Confirmation Mechanism
The problem of the existing constructing process for virtual biology model is that it is not analyzed whether the enacted initial condition of the judgment model is reasonable or satisfying with the natural bi...
-
Chapter and Conference Paper
Email Community Detection Using Artificial Ant Colony Clustering
The investigation of community structures in networks is an important issue in many domains and disciplines. Several types of algorithms exist for revealing the community structure in networks. However, Most o...
-
Chapter and Conference Paper
An Epileptic Seizure Prediction Algorithm from Scalp EEG Based on Morphological Filter and Kolmogorov Complexity
Epilepsy is the most common neurological disorder in the world, second only to stroke. There are nearly 15 million patients suffer from refractory epilepsy, with no available therapy. Although most seizures ar...
-
Chapter and Conference Paper
QoS-Based Services Selecting and Optimizing Algorithms on Grid
QoS-Based Services Selecting and Optimizing Composition between the peers play an increasingly important role to ensure interoperability on Grid environment. However, the prohibitive cost of selecting, matchin...
-
Article
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks
ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptography (CA-PKC), and has drawn researchers’ extensive attention in recent years. However, the existing elec...
-
Chapter and Conference Paper
The Research on the Algorithms of Keyword Search in Relational Database
With the development of relational database, people require better database not only in the aspect of database performance, but also in the aspect of the database’s interactive ability. So that the database is...
-
Chapter and Conference Paper
Online Generation and Dissemination of Disaster Information Based on Satellite Remote Sensing Data
This paper aims to introduce a system framework for online generation and dissemination of disaster information based on satellite remote sensing data, that is, the design and application of the WEB-based Disa...
-
Chapter and Conference Paper
An Energy-Efficiency Route Protocol for MIMO-Based Wireless Sensor Networks
A novel multihop energy-efficiency routing protocol for MIMO-based WSN is proposed in this paper. The protocol integrates cooperative MIMO technology with the multihop routing and energy consumption. When buil...
-
Chapter and Conference Paper
E-Scheme in Delay-Tolerant Networks
Delay Tolerant Networks (DTNs) are characterized by very long delay paths and frequent network partitions. In this paper, a novel E-Scheme is proposed which can be utilized by most of the existing routing appr...