Sciweavers

3055 search results - page 507 / 611
» Conceptual Modeling for Data Integration
Sort
View
PERVASIVE
2007
Springer
14 years 9 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
ECIR
2010
Springer
14 years 8 months ago
Query Aspect Based Term Weighting Regularization in Information Retrieval
Abstract. Traditional retrieval models assume that query terms are independent and rank documents primarily based on various term weighting strategies including TF-IDF and document...
Wei Zheng, Hui Fang
ACSAC
2003
IEEE
15 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
DSN
2008
IEEE
15 years 4 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
MATES
2005
Springer
15 years 3 months ago
Collaborative Agent-Based Knowledge Support for Empirical and Knowledge-Intense Processes
Independent from specific application domains, similar requirements can be identified regarding information needs during daily work. For coping with generality on the one hand an...
Andrea Freßmann, Kerstin Maximini, Rainer Ma...