Sciweavers

30 search results - page 6 / 6
» Imprecise Data and Knowledge Based OLAP
Sort
View
WSNA
2003
ACM
13 years 11 months ago
Cleaning and querying noisy sensors
Sensor networks have become an important source of data with numerous applications in monitoring various real-life phenomena as well as industrial applications and traffic contro...
Eiman Elnahrawy, Badri Nath
WSC
2008
13 years 8 months ago
Reliable simulation with input uncertainties using an interval-based approach
Uncertainty associated with input parameters and models in simulation has gained attentions in recent years. The sources of uncertainties include lack of data and lack of knowledg...
Ola Ghazi Batarseh, Yan Wang
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 7 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
ACSAC
2008
IEEE
14 years 8 days ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CLEIEJ
2007
90views more  CLEIEJ 2007»
13 years 5 months ago
Software - Implemented Self-healing System
The term “Self-healing” denotes the capability of a software system in dealing with bugs. Fault tolerance for dependable computing is to provide the specified service through ...
Goutam Kumar Saha