Sciweavers

2957 search results - page 495 / 592
» Code analysis and CS-XML
Sort
View
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IPPS
2009
IEEE
15 years 11 months ago
Toward adjoinable MPI
4 Automatic differentiation is the primary means of obtaining analytic5 derivatives from a numerical model given as a computer program. There-6 fore, it is an essential productivi...
Jean Utke, Laurent Hascoët, Patrick Heimbach,...
AIME
2009
Springer
15 years 11 months ago
Mining Healthcare Data with Temporal Association Rules: Improvements and Assessment for a Practical Use
Abstract. The Regional Healthcare Agency (ASL) of Pavia has been maintaining a central data repository which stores healthcare data about the population of Pavia area. The analysis...
Stefano Concaro, Lucia Sacchi, Carlo Cerra, Pietro...
CAIP
2009
Springer
211views Image Analysis» more  CAIP 2009»
15 years 10 months ago
Contextual-Guided Bag-of-Visual-Words Model for Multi-class Object Categorization
Abstract. Bag-of-words model (BOW) is inspired by the text classification problem, where a document is represented by an unsorted set of contained words. Analogously, in the objec...
Mehdi Mirza-Mohammadi, Sergio Escalera, Petia Rade...
COMPGEOM
2009
ACM
15 years 10 months ago
Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension
We describe a new implementation of the well-known incremental algorithm for constructing Delaunay triangulations in any dimension. Our implementation follows the exact computing ...
Jean-Daniel Boissonnat, Olivier Devillers, Samuel ...