Network Intrusion Intelligent Real-Time Detection System (Unknown)
- New search for: Zhao, H.
- New search for: Li, J.
- New search for: Yang, Y.
- New search for: Zhao, H.
- New search for: Li, J.
- New search for: Yang, Y.
In:
JOURNAL- SHANGHAI JIAOTONG UNIVERSITY -CHINESE EDITION-
;
33
, 1
;
76-79
;
1999
-
ISSN:
- Article (Journal) / Print
-
Title:Network Intrusion Intelligent Real-Time Detection System
-
Contributors:
-
Published in:JOURNAL- SHANGHAI JIAOTONG UNIVERSITY -CHINESE EDITION- ; 33, 1 ; 76-79
-
Publisher:
- New search for: SHANGHAI JIAOTONG UNIVERSITY PRESS
-
Publication date:1999-01-01
-
Size:4 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 050
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 050 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 33, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Algorithm to Solve Maximum Weighted Non-Crossing Matching in MCM RoutingMao, J. / Li, Z. et al. | 1999
- 4
-
Extraction of Frequency-Dependent Inductance of 3 D Interconnects in High Speed CircuitsZheng, J. / Li, Z. et al. | 1999
- 7
-
Programming Recursive Algorithm for Transient Simulation of Interconnects in High Speed VLSIWang, J. / Xu, O. / Li, Z. et al. | 1999
- 12
-
Hierarchical Design Rule Checking Approach for IC LayoutLi, G. / Chen, H. / Lin, Z. et al et al. | 1999
- 15
-
Linearized Optimization Layer by Layer for MLP TrainingZhou, Z. / Hu, G. / Li, Q. et al. | 1999
- 19
-
Local Linear Prediction Method of Chaotic Time SeriesRen, X. / Hu, G. / Xu, X. et al. | 1999
- 22
-
Parameter Estimation and Filtering for Chaotic Time Series by Steepest DescentRen, X. / Hu, G. / Xu, X. et al. | 1999
- 25
-
Efficient Truncating Boundary Condition for Capacitance Extraction with FD MethodCao, Y. / Jin, R. / Li, Z. et al. | 1999
- 29
-
An Efficient Method of Simulating Microwave MCMWang, J. / Li, Z. / Mao, J. et al. | 1999
- 32
-
Nonlinear Analysis of MR64QAM/OFDM Transmission SystemLi, G. et al. | 1999
- 36
-
Quasi-Static Analysis of Fully Shielded Coplanar Coupled WaveguideZhou, X. / Wang, S. / Duan, L. et al. | 1999
- 40
-
Direction-of-Arrival and Frequency Estimation in Array Signal ProcessingWang, S. / Zhou, X. et al. | 1999
- 43
-
Quasistatic Analysis of Elliptical Cylindrical Coplanar WaveguidesZhou, X. / Wang, Y. et al. | 1999
- 46
-
Operating Language Model of Multidatabase in CSCW EnvironmentWang, Z. / Li, J. / Zhu, H. et al et al. | 1999
- 50
-
Practice on Access Networks and Its Management SystemZhu, X. / Hu, B. / Yang, C. et al. | 1999
- 53
-
Measurement of the Roughness of Supersmooth Surface Using Optical Heterodyne MethodLuo, Z. / Yang, J. / Zhang, M. et al. | 1999
- 57
-
Quick Polar Coordinates to Orthogonal Coordinates Mapping Method in PPI Radar Signal DisplayingLiang, J. / Xue, Y. et al. | 1999
- 61
-
Method of Increasing Utilization of Upstream Bandwidth in HFC NetworkJu, S. / Bi, G. et al. | 1999
- 65
-
Application of Time-Domain Schemes Based on Multiresolution to Microwave Integrated CircuitsYuan, Z. / Li, Z. et al. | 1999
- 69
-
Virtual Buffer Control Strategy for MPEG-2 System Layer MultiplexingPu, B. / Sun, J. / Yu, S. et al. | 1999
- 73
-
Synthetic Research and Optimal Desing of Signalling System in Mobile Satellite Communication SystemYuan, S. / Song, W. et al. | 1999
- 76
-
Network Intrusion Intelligent Real-Time Detection SystemZhao, H. / Li, J. / Yang, Y. et al. | 1999
- 80
-
Generic Model for Virtual Private NetworksWeng, L. / Zhu, H. et al. | 1999
- 84
-
Improvement to Information Transaction Model Based on SET ProtocolTian, M. / Yang, Y. / Li, J. et al. | 1999
- 88
-
Simulation Modeling and Parallelism Implementation Frame of Simulation On Demand SystemLi, J. / Wang, Z. / Zhu, H. et al et al. | 1999
- 92
-
Design of a QoS-Controlled Protocol Architecture for End-SystemChen, Y. / Gu, S. et al. | 1999
- 96
-
Modified Greedy Algorithm for Optimal Text SelectionGu, W. et al. | 1999
- 101
-
Concurrency Control Scheme for CSCWXiao, B. / Zhang, D. / Zhu, H. et al. | 1999
- 104
-
Technical Analysis of Data/Voice IntegrationHuang, H. / Yang, Y. / Zhu, H. et al. | 1999
- 108
-
Secure Transmission Model of E-Business Information Based On InternetHuang, C. / Yang, Y. / Li, J. et al. | 1999
- 111
-
Voice Switching Techniques Based on ATMHuang, H. / Zhu, H. / Gu, S. et al. | 1999
- 115
-
Implementation Technology of HDTV Transport MultiplexerLi, J. / Ye, W. / Huang, T. et al et al. | 1999
- 119
-
Reconstruction of Missing Frames for G. 729 CS-ACELPXue, Z. / Gu, S. et al. | 1999
- 122
-
Database Intelligent Sorting SystemKang, H. / Xu, G. / Yang, J. et al et al. | 1999
- 124
-
Probing of IP Path ThroughputYu, X. / Zhao, H. / Yang, Y. et al. | 1999