Sciweavers

3168 search results - page 604 / 634
» Neutrosophic Relational Data Model
Sort
View
ETRICS
2006
15 years 5 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ECAI
2000
Springer
15 years 5 months ago
Learning Efficiently with Neural Networks: A Theoretical Comparison between Structured and Flat Representations
Abstract. We are interested in the relationship between learning efficiency and representation in the case of supervised neural networks for pattern classification trained by conti...
Marco Gori, Paolo Frasconi, Alessandro Sperduti
INFOCOM
2000
IEEE
15 years 5 months ago
Variance of Aggregated Web Traffic
Abstract-If data traffic were Poisson, increases in the amount of traffic aggregated on a network would rapidly decrease the relative size of bursts. The discovery of pervasive lon...
Robert Morris, Dong Lin
ICCV
1995
IEEE
15 years 5 months ago
Geodesic Active Contours
A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the imag...
Vicent Caselles, Ron Kimmel, Guillermo Sapiro
VLDB
1991
ACM
146views Database» more  VLDB 1991»
15 years 4 months ago
An Evaluation of Non-Equijoin Algorithms
A non-equijoin of relations R and S is a band join if the join predicate requires values in the join attribute of R to fall within a speci ed band about the values in the join att...
David J. DeWitt, Jeffrey F. Naughton, Donovan A. S...