Sciweavers

1585 search results - page 286 / 317
» Creating a Knowledge Base of Biological Research Papers
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
15 years 1 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
JSS
2002
90views more  JSS 2002»
14 years 11 months ago
Visual requirement representation
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi
MOBIHOC
2006
ACM
15 years 11 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
100
Voted
IROS
2009
IEEE
187views Robotics» more  IROS 2009»
15 years 6 months ago
Compliant quadruped locomotion over rough terrain
— Many critical elements for statically stable walking for legged robots have been known for a long time, including stability criteria based on support polygons, good foothold se...
Jonas Buchli, Mrinal Kalakrishnan, Michael Mistry,...
DAWAK
2005
Springer
15 years 5 months ago
Processing Sequential Patterns in Relational Databases
Database integration of data mining has gained popularity and its significance is well recognized. However, the performance of SQL based data mining is known to fall behind specia...
Xuequn Shang, Kai-Uwe Sattler