Sciweavers

1333 search results - page 260 / 267
» Not a Number of Floating Point Problems
Sort
View
94
Voted
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
91
Voted
IICAI
2003
14 years 11 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
USENIX
2001
14 years 11 months ago
Page Replacement in Linux 2.4 Memory Management
While the virtual memory management in Linux 2.2 has decent performance for many workloads, it suffers from a number of problems. The first part of this paper contains a descripti...
Rik van Riel
ACL
1998
14 years 11 months ago
A Generative Lexicon Perspective for Adjectival Modification
This paper presents a semantic interpretation of adjectival modification in terms of the Generative Lexicon. It highlights the elements which can be borrowed from the GL and devel...
Patrick Saint-Dizier
COLING
2000
14 years 11 months ago
Unscrambling English word order
We propose a treatment of `extraposition' which allows items to be assimilated directly even when they appear far from their canonical positions. This treatment supports anal...
Allan Ramsay, Helen Seville