Sciweavers

80 search results - page 16 / 16
» Managing intrusion detection rule sets
Sort
View
ISWC
2003
IEEE
13 years 10 months ago
SenSay: A Context-Aware Mobile Phone
SenSay is a context-aware mobile phone that adapts to dynamically changing environmental and physiological states. In addition to manipulating ringer volume, vibration, and phone ...
Daniel P. Siewiorek, Asim Smailagic, Junichi Furuk...
IWAN
1999
Springer
13 years 9 months ago
Policy Specification for Programmable Networks
There is a need to be able to program network components to adapt to application requirements for quality of service, specialised application dependent routing, to increase effici...
Morris Sloman, Emil Lupu
IQ
2007
13 years 6 months ago
Simulations Of Error Propagation For Prioritizing Data Accuracy Improvement Efforts
: Models of the association between input accuracy and output accuracy imply that, for any given application, the effect of input errors on the output error rate generally varies i...
Irit Askira Gelman
EDBT
2009
ACM
136views Database» more  EDBT 2009»
13 years 11 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...
JELIA
2000
Springer
13 years 8 months ago
An Algorithmic Approach to Recover Inconsistent Knowledge-Bases
Abstract. We consider an algorithmic approach for revising inconsistent data and restoring its consistency. This approach detects the\spoiled" part of the data (i.e., the set ...
Ofer Arieli