Sciweavers

17582 search results - page 3457 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 6 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ATAL
2004
Springer
15 years 5 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
VLDB
1987
ACM
92views Database» more  VLDB 1987»
15 years 5 months ago
Mind Your Grammar: a New Approach to Modelling Text
Beginning to create the New Oxford English Dictionary database has resulted in the realization that databases for reference texts are unlike those for conventional enterprises. Wh...
Gaston H. Gonnet, Frank Wm. Tompa
COMPSAC
2007
IEEE
15 years 3 months ago
Towards End User Service Composition
The popularity of Service Oriented Computing (SOC) brings a large number of distributed, well-encapsulated and reusable services all over internet, and makes it possible to create...
Xuanzhe Liu, Gang Huang, Hong Mei
AAAI
2006
15 years 3 months ago
Preference Elicitation and Generalized Additive Utility
Any automated decision support software must tailor its actions or recommendations to the preferences of different users. Thus it requires some representation of user preferences ...
Darius Braziunas, Craig Boutilier
« Prev « First page 3457 / 3517 Last » Next »