Sciweavers

7941 search results - page 18 / 1589
» Network Analysis of Repositories
Sort
View
140
Voted
ACSAC
2009
IEEE
15 years 10 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
136
Voted
WS
2010
ACM
15 years 2 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
160
Voted
AISC
2010
Springer
15 years 6 months ago
On Building a Knowledge Base for Stability Theory
A lot of mathematical knowledge has been formalized and stored in repositories by now: Different mathematical theorems and theories have been taken into consideration and included ...
Agnieszka Rowinska-Schwarzweller, Christoph Schwar...
126
Voted
ISDA
2008
IEEE
15 years 10 months ago
Performance Comparison of ADRS and PCA as a Preprocessor to ANN for Data Mining
In this paper we compared the performance of the Automatic Data Reduction System (ADRS) and principal component analysis (PCA) as a preprocessor to artificial neural networks (ANN...
Nicholas Navaroli, David Turner, Arturo I. Concepc...
132
Voted
ICSNC
2007
IEEE
15 years 10 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva