In this paper we describe a data mining framework for constructing intrusion detection models. The first key idea is to mine system audit data for co...
We present a design and implementation for displaying and manipulating HTML pages on small handheld devices such as personal digital assistants (PDAs)...
This editorial analyzes from a variety of perspectives the controversial issue of single-blind versus double-blind reviewing. In single-blind reviewin...
publié le: April 2007
The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs). The protocols are subdivided into grou...
Full-text indexes provide fast substring search over large text collections. A serious problem of these indexes has traditionally been their space con...