Sciweavers

1401 search results - page 100 / 281
» Cost-Sensitive Test Strategies
Sort
View
CRITIS
2007
14 years 12 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
LREC
2010
223views Education» more  LREC 2010»
14 years 11 months ago
An API for Multi-lingual Ontology Matching
Ontology matching consists of generating a set of correspondences between the entities of two ontologies. This process is seen as a solution to data heterogeneity in ontology-base...
Cássia Trojahn dos Santos, Paulo Quaresma, ...
BMCBI
2005
63views more  BMCBI 2005»
14 years 10 months ago
Individual sequences in large sets of gene sequences may be distinguished efficiently by combinations of shared sub-sequences
Background: Most current DNA diagnostic tests for identifying organisms use specific oligonucleotide probes that are complementary in sequence to, and hence only hybridise with th...
Mark J. Gibbs, John S. Armstrong, Adrian J. Gibbs
DSS
2002
83views more  DSS 2002»
14 years 10 months ago
EIS support for the strategic management process
The success of an executive information system (EIS) depends upon many factors, including providing support for the strategic management process (SMP). The SMP is comprised of fiv...
Sanjay K. Singh, Hugh J. Watson, Richard T. Watson
ICFEM
2010
Springer
14 years 8 months ago
Dynamic Resource Reallocation between Deployment Components
Abstract. Today’s software systems are becoming increasingly configurable and designed for deployment on a plethora of architectures, ranging from sequential machines via multic...
Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte, Si...