Sciweavers

2736 search results - page 404 / 548
» Implementable allocation rules
Sort
View
138
Voted
IEEEIAS
2009
IEEE
15 years 9 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
163
Voted
ATAL
2009
Springer
15 years 9 months ago
Aerogility: an intelligent decision support system for managing service-based aftermarkets
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...
EPIA
2009
Springer
15 years 9 months ago
Learning Visual Object Categories with Global Descriptors and Local Features
Different types of visual object categories can be found in real-world applications. Some categories are very heterogeneous in terms of local features (broad categories) while oth...
Rui Pereira, Luís Seabra Lopes
105
Voted
MODELS
2009
Springer
15 years 9 months ago
An Incremental Algorithm for High-Performance Runtime Model Consistency
We present a novel technique for applying two-level runtime models to distributed systems. Our approach uses graph rewriting rules to transform a high-level source model into one o...
Christopher Wolfe, T. C. Nicholas Graham, W. Greg ...
102
Voted
SEMWEB
2009
Springer
15 years 9 months ago
Parallel Materialization of the Finite RDFS Closure for Hundreds of Millions of Triples
In this paper, we consider the problem of materializing the complete finite RDFS closure in a scalable manner; this includes those parts of the RDFS closure that are often ignored...
Jesse Weaver, James A. Hendler