NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Jie Chi; Lin, Yi Lung – Educational Technology & Society, 2010
When using mobile devices in support of learning activities, students gain mobility, but problems arise when group members share information. The small size of the mobile device screen becomes problematic when it is being used by two or more students to share and exchange information. This problem affects interactions among group members. To…
Descriptors: Electronic Learning, Student Attitudes, Pretests Posttests, Achievement Tests