Sciweavers

270 search results - page 35 / 54
» Architecture Normalization for Component-based Systems
Sort
View
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 12 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
SAC
2006
ACM
15 years 5 months ago
Trust-enhanced visibility for personalized document recommendations
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Claudia Hess, Klaus Stein, Christoph Schlieder
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 4 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ECIS
2000
15 years 1 months ago
Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment
Abstract-- Knowledge management is becoming a fashion in many organizations. This entails the danger that large investments in knowledge externalization are made with little short-...
Ralf Klamma, Sylvia Schlaphof
IJCSA
2007
100views more  IJCSA 2007»
14 years 11 months ago
Using Artificial Neural networks for the modelling of a distillation column
The main aim of this paper is to establish a reliable model both for the steady-state and unsteady-state regimes of a nonlinear process. The use of this model should reflect the t...
Yahya Chetouani