Sciweavers

1170 search results - page 87 / 234
» Experience with Ripple-Down Rules
Sort
View
IAW
2003
IEEE
15 years 7 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ISCAS
2003
IEEE
117views Hardware» more  ISCAS 2003»
15 years 7 months ago
Learning temporal correlations in biologically-inspired aVLSI
Temporally-asymmetric Hebbian learning is a class of algorithms motivated by data from recent neurophysiology experiments. While traditional Hebbian learning rules use mean firin...
Adria Bofill-i-Petit, Alan F. Murray
WADT
1998
Springer
15 years 6 months ago
Non-deterministic Computations in ELAN
Abstract. The ELAN system is an environment for specifying and prototyping constraint solvers, theorem provers and deduction systems in general. It also provides a framework for ex...
Hélène Kirchner, Pierre-Etienne More...
168
Voted
MOBICOM
1997
ACM
15 years 6 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
DIAGRAMS
2004
Springer
15 years 5 months ago
Incorporating Perceptual Task Effort into the Recognition of Intention in Information Graphics
The rapidly increasing availability of electronic publications containing information graphics poses some interesting challenges in terms of information access. For example, visual...
Stephanie Elzer, Nancy Green, Sandra Carberry, Jam...