A feature interaction conflicts detection engine for pervasive networked environment
Feature interaction (FI) problems have long been a popular topic of investigation in Internet telephony environment. Due to recent proliferation of ubiquitous networked appliances, FI problems in networked appliances environment are becoming more apparent. FI problems create various conflicts which...
| Main Authors: | Low, H. K., Chieng, D., Mustapha, A. K., Ngeow,, Y. C., Goh, E. |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3228/ |
Similar Items
Web-based device workflow management engine
by: Ngeow, Y. C., et al.
Published: (2007)
by: Ngeow, Y. C., et al.
Published: (2007)
A context-aware architecture for smart space environment
by: Goh, E., et al.
Published: (2007)
by: Goh, E., et al.
Published: (2007)
Context modeling and reasoning in a smart space environment
by: Yin, Erin Goh Yii, et al.
Published: (2007)
by: Yin, Erin Goh Yii, et al.
Published: (2007)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Semantic web service adaptation model for a pervasive learning scenario
by: Lau, B-Y-S., et al.
Published: (2008)
by: Lau, B-Y-S., et al.
Published: (2008)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
Automated Detection of Anesthetic Depth Levels Using Chaotic Features with Artificial Neural Networks
by: Lalitha, V., et al.
Published: (2007)
by: Lalitha, V., et al.
Published: (2007)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Texture Features Selection for Masses Detection In Digital Mammogram
by: A. M., Khuzi, et al.
Published: (2008)
by: A. M., Khuzi, et al.
Published: (2008)
An adaptive fuzzy min-max conflict-resolving classifier
by: Tan, , Shing Chiang, et al.
Published: (2006)
by: Tan, , Shing Chiang, et al.
Published: (2006)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
SLA-driven flexible bandwidth reservation negotiation schemes for QoS aware IP networks
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Protein Secondary Structure Prediction Using Ensemble Neural Networks With Local And Long-range Amino-acid Features
by: Hazzaa Mahyoub, Fawaz Hameed
Published: (2021)
by: Hazzaa Mahyoub, Fawaz Hameed
Published: (2021)
Color Feature Embedded for Content-based Image Retrieval System.
by: Sumari, Putra, et al.
by: Sumari, Putra, et al.
Analysis Of Feature Reduction Algorithms To Estimate
Human Stress Conditions
by: Arasu, Darshan Babu
Published: (2022)
by: Arasu, Darshan Babu
Published: (2022)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Global sonar localization in a dynamic environment using preprocessed feedforward neural network
by: Lim, W. S., et al.
Published: (2008)
by: Lim, W. S., et al.
Published: (2008)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
A flexible bandwidth resource provisioning system with agent-enhanced SLA negotiation
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Similar Items
-
Web-based device workflow management engine
by: Ngeow, Y. C., et al.
Published: (2007) -
A context-aware architecture for smart space environment
by: Goh, E., et al.
Published: (2007) -
Context modeling and reasoning in a smart space environment
by: Yin, Erin Goh Yii, et al.
Published: (2007) -
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015) -
Semantic web service adaptation model for a pervasive learning scenario
by: Lau, B-Y-S., et al.
Published: (2008)