Sciweavers

1146 search results - page 128 / 230
» Evaluation of modeling techniques for agent-based systems
Sort
View
CISISSPAIN
2011
14 years 4 months ago
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans
In last decades there have been many proposals from the machine learning community in the intrusion detection field. One of the main problems that Intrusion Detection Systems (IDSs...
Silvia González, Javier Sedano, Álva...
SIGMOD
2000
ACM
158views Database» more  SIGMOD 2000»
15 years 5 months ago
NiagaraCQ: A Scalable Continuous Query System for Internet Databases
Continuous queries are persistent queries that allow users to receive new results when they become available. While continuous query systems can transform a passive web into an ac...
Jianjun Chen, David J. DeWitt, Feng Tian, Yuan Wan...
118
Voted
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 4 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
211
Voted
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
16 years 2 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
124
Voted
TPDS
2008
196views more  TPDS 2008»
15 years 21 days ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...