Sciweavers

5856 search results - page 1014 / 1172
» Developing Query Patterns
Sort
View
CORR
2006
Springer
93views Education» more  CORR 2006»
14 years 10 months ago
Constructing experimental indicators for Open Access documents
The ongoing paradigm change in the scholarly publication system (`science is turning to e-science') makes it necessary to construct alternative evaluation criteria/metrics wh...
Philipp Mayr
CORR
2006
Springer
91views Education» more  CORR 2006»
14 years 10 months ago
Quasi-friendly sup-interpretations
In a previous paper [16], the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static an...
Jean-Yves Marion, Romain Péchoux
EOR
2006
104views more  EOR 2006»
14 years 10 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 10 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
« Prev « First page 1014 / 1172 Last » Next »