Results 171 to 180 of about 140,750 (200)
Some of the next articles are maybe not open access.

WIDS

Proceedings of the 2008 international symposium on Database engineering & applications - IDEAS '08, 2008
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purposes of real time detection of anomalous behavior in wireless packets. Using hardware sensors to capture network packets enables detection of attacks before they reach access ...
C. I. Ezeife   +2 more
openaire   +1 more source

A WID Collaborative Pedagogical Model in Computing

2019
As many countries in the Middle East region have adopted English as the dominant medium of instruction in higher education, language support mechanisms offered to learners are an area demanding urgent attention in research and pedagogy. This chapter is a reflective account of a collaborative instructional model adopted to support the academic writing ...
Priya Mathew, Deepali Bhatnagar
openaire   +1 more source

Internet Scale Testing of PNRP Using WiDS Network Simulator

Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006
PNRP (peer name resolution protocol) is a decentralized name resolution and routing protocol built into the Windowstrade operating system that creates an Internet-scale peer-to-peer structured overlay. Ensuring the protocol's performance in Internet scale presents a critical challenge.
null Haifeng Yang   +2 more
openaire   +1 more source

Promoting WID in Jordan.

Joicfp News, 1994
Founded in 1977, the Queen Alia Fund (QAF) has been promoting social development in Jordan for 15 years by providing social services, and educational and vocational training at the grassroots. The fund, which is the country's principal nongovernmental organization (NGO), operates a network of over 40 community development centers.
openaire   +1 more source

PInterrogating Disciplines/Disciplinarity in WAC/WID: An Institutional Study

College Composition & Communication, 2015
Examination of the perspectives and experiences of faculty, graduate student instructors, and undergraduates participating in a WAC/WID program shows how discipline-focused WAC/WID principles are often resisted, interrogated, and subverted by all three groups of stakeholders.
Anne Ruggles Gere   +3 more
openaire   +1 more source

The State of WAC/WID in 2010: Methods and Results of the U.S. Survey of the International WAC/WID Mapping Project

College Composition & Communication, 2010
As writing across the curriculum (WAC) has matured and diversified as a concept and as an organizational structure in U.S. higher education, there has arisen a need for accurate, up-to-date information on the presence and characteristics of WAC and writing-in-the-disciplines (WID) programs. Following on the only previous nationwide survey of WAC/WID in
Chris Thaiss, Tara Porter
openaire   +1 more source

WIDS Real-Time Intrusion Detection System Using Entrophical Approach

2014
Nowadays, threats, worms, virus, and malwares in the Internet and security breaches such as intrusion and penetration testing in the network are quite common and lead to the loss of huge amount data. In recent decades, various researchers revealed their perceptions on security and security-related issues.
Kamalanaban Ethala   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy