Sciweavers

11573 search results - page 1978 / 2315
» Designing Relational Databases
Sort
View
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
SSS
2005
Springer
119views Control Systems» more  SSS 2005»
15 years 10 months ago
Self-stabilization of Byzantine Protocols
Awareness of the need for robustness in distributed systems increases as distributed systems become integral parts of day-to-day systems. Self-stabilizing while tolerating ongoing ...
Ariel Daliot, Danny Dolev
UML
2005
Springer
15 years 10 months ago
Replicators: Transformations to Address Model Scalability
In Model Integrated Computing, it is often desirable to evaluate different design alternatives as they relate to issues of scalability. A typical approach to address scalability is...
Jeffrey G. Gray, Yuehua Lin, Jing Zhang, Steven No...
VIZSEC
2005
Springer
15 years 10 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
WADS
2005
Springer
111views Algorithms» more  WADS 2005»
15 years 10 months ago
On Geometric Dilation and Halving Chords
Let G be an embedded planar graph whose edges may be curves. The detour between two points, p and q (on edges or vertices) of G, is the ratio between the shortest path in G between...
Adrian Dumitrescu, Annette Ebbers-Baumann, Ansgar ...
« Prev « First page 1978 / 2315 Last » Next »