Sciweavers

1203 search results - page 205 / 241
» A Reference Model for a Networked Organization
Sort
View
106
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 6 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
92
Voted
IRREGULAR
1997
Springer
15 years 4 months ago
Programming with Shared Data Abstractions
ing with shared data abstractions Simon Dobson1 and Don Goodeve2 1 Well-Founded Systems Unit, CLRC Rutherford Appleton Laboratory, UK 2 School of Computer Studies, University of Le...
Simon A. Dobson, Don Goodeve
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 4 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
84
Voted
CSIE
2009
IEEE
15 years 1 months ago
An Investigation of Forecasting Critical Spare Parts Requirement
The critical spare parts (CSP) is essential to machine operation, which is also more expensive, have longer purchasing lead time and larger demand variation than non-critical spar...
Fei-Long Chen, Yun-Chin Chen
CN
2006
98views more  CN 2006»
15 years 17 days ago
A performance analysis of context transfer protocols for QoS enabled internet services
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
Novella Bartolini, Emiliano Casalicchio