Sciweavers

3686 search results - page 514 / 738
» Comprehensive comprehensions
Sort
View
CSDA
2008
147views more  CSDA 2008»
15 years 3 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
116
Voted
DEBU
2008
141views more  DEBU 2008»
15 years 3 months ago
Oracle's SQL Performance Analyzer
We present the SQL Performance Analyzer, a novel approach in Oracle Database 11g to testing database changes, such as upgrades, parameter changes, schema changes, and gathering op...
Khaled Yagoub, Peter Belknap, Benoît Dagevil...
172
Voted
DKE
2008
208views more  DKE 2008»
15 years 3 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
146
Voted
ADHOC
2006
87views more  ADHOC 2006»
15 years 3 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
128
Voted
EL
2008
166views more  EL 2008»
15 years 3 months ago
The digital library as an enterprise: the Zachman approach
Purpose: Examines the needs of digital library stakeholders and how a collaborative digital library might be designed to meet these needs. The collaborative digital library has be...
Abdullah Abrizah, A. N. Zainab