Sciweavers

293 search results - page 16 / 59
» Meta Modelling of Embedded Systems using Active Databases
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
108
Voted
ISVC
2007
Springer
15 years 3 months ago
Content-Based Image Retrieval Using Shape and Depth from an Engineering Database
Content based image retrieval (CBIR), a technique which uses visual contents to search images from the large scale image databases, is an active area of research for the past decad...
Amit Jain, Ramanathan Muthuganapathy, Karthik Rama...
HT
2004
ACM
15 years 2 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
CINQ
2004
Springer
182views Database» more  CINQ 2004»
15 years 1 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
WSC
2004
14 years 11 months ago
IAGO Project and Development of Compound Agents
The IAGO Project explores the question of whether a software model, in the form of a computational model of cognitive behavior, can contribute to better anticipation of asymmetric...
John E. Hiles