Sciweavers

945 search results - page 71 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...
CIA
2008
Springer
15 years 3 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
EEE
2005
IEEE
15 years 7 months ago
SLA Representation, Management and Enforcement
As the IT industry is becoming more and more interested in service oriented business models and upcoming technologies like Web Services or Grid Computing, the need for automated c...
Adrian Paschke, Martin Bichler
122
Voted
VMV
2003
145views Visualization» more  VMV 2003»
15 years 3 months ago
Interactive Volume Visualization of Complex Flow Semantics
Comprehending results from 3D CFD simulation is a difficult task. In this paper, we present a semantics-based approach to featurebased volume rendering of 3D flow data. We make ...
Helwig Hauser, Matej Mlejnek
IEEEVAST
2010
14 years 8 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen