Sciweavers

7941 search results - page 18 / 1589
» Network Analysis of Repositories
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
WS
2010
ACM
14 years 10 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
AISC
2010
Springer
15 years 2 months ago
On Building a Knowledge Base for Stability Theory
A lot of mathematical knowledge has been formalized and stored in repositories by now: Different mathematical theorems and theories have been taken into consideration and included ...
Agnieszka Rowinska-Schwarzweller, Christoph Schwar...
86
Voted
ISDA
2008
IEEE
15 years 6 months ago
Performance Comparison of ADRS and PCA as a Preprocessor to ANN for Data Mining
In this paper we compared the performance of the Automatic Data Reduction System (ADRS) and principal component analysis (PCA) as a preprocessor to artificial neural networks (ANN...
Nicholas Navaroli, David Turner, Arturo I. Concepc...
ICSNC
2007
IEEE
15 years 6 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva