Sciweavers

1940 search results - page 319 / 388
» Eurostore - Initial Design and First Results
Sort
View
ACSAC
2004
IEEE
15 years 3 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ACSC
2004
IEEE
15 years 3 months ago
Adaptive Cooperative Fuzzy Logic Controller
Fuzzy logic is a natural basis for modelling and solving problems involving imprecise knowledge and continuous systems. Unfortunately, fuzzy logic systems are invariably static (o...
Justin Ammerlaan, David Wright
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
15 years 3 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
ASAP
2004
IEEE
119views Hardware» more  ASAP 2004»
15 years 3 months ago
Automatic Synthesis of Customized Local Memories for Multicluster Application Accelerators
Distributed local memories, or scratchpads, have been shown to effectively reduce cost and power consumption of application-specific accelerators while maintaining performance. Th...
Manjunath Kudlur, Kevin Fan, Michael L. Chu, Scott...
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 3 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner