Sciweavers

5189 search results - page 354 / 1038
» Modeling architectural patterns using architectural primitiv...
Sort
View
AI
2006
Springer
15 years 4 months ago
Propagation algorithms for lexicographic ordering constraints
Finite-domain constraint programming has been used with great success to tackle a wide variety of combinatorial problems in industry and academia. To apply finite-domain constrain...
Alan M. Frisch, Brahim Hnich, Zeynep Kiziltan, Ian...
ICONIP
2004
15 years 6 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
149
Voted
WIRTSCHAFTSINFORMATI
2007
15 years 5 months ago
Optimized Dynamic Allocation Management for ERP Systems and Enterprise Services
To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP) and enterprise services, a peak-load oriented hardware sizing is often used, wh...
Valentin Nicolescu, Martin Wimmer, Raphael Geissle...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 2 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 8 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith