Sciweavers

3133 search results - page 95 / 627
» Difference systems of sets and cyclotomy
Sort
View
DSN
2006
IEEE
15 years 4 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
AICCSA
2005
IEEE
86views Hardware» more  AICCSA 2005»
15 years 3 months ago
Preemptive rate-based operator scheduling in a data stream management system
Data Stream Management Systems are being developed to process continuous queries over multiple data streams. These continuous queries are typically used for monitoring purposes wh...
Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandro...
EWCBR
2000
Springer
15 years 1 months ago
Maintaining Case-Based Reasoning Systems Using Fuzzy Decision Trees
This paper proposes a methodology of maintaining Case Based Reasoning (CBR) systems by using fuzzy decision tree induction - a machine learning technique. The methodology is mainly...
Simon C. K. Shiu, Cai Hung Sun, Xizhao Wang, Danie...
ER
2008
Springer
99views Database» more  ER 2008»
14 years 11 months ago
Relaxed Compliance Notions in Adaptive Process Management Systems
The capability to dynamically evolve process models over time and to migrate process instances to a modified model version are fundamental requirements for any process-aware inform...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...
QEST
2006
IEEE
15 years 3 months ago
Modeling and Optimization Problems in Contact Centers
We give a quick overview of some key issues in (quantitative) call center management: building realistic models, developing efficient tools to simulate these models, finding qui...
Pierre L'Ecuyer