Sciweavers

1333 search results - page 260 / 267
» Not a Number of Floating Point Problems
Sort
View
112
Voted
ISSA
2004
15 years 1 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
IICAI
2003
15 years 1 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
118
Voted
USENIX
2001
15 years 1 months ago
Page Replacement in Linux 2.4 Memory Management
While the virtual memory management in Linux 2.2 has decent performance for many workloads, it suffers from a number of problems. The first part of this paper contains a descripti...
Rik van Riel
ACL
1998
15 years 1 months ago
A Generative Lexicon Perspective for Adjectival Modification
This paper presents a semantic interpretation of adjectival modification in terms of the Generative Lexicon. It highlights the elements which can be borrowed from the GL and devel...
Patrick Saint-Dizier
78
Voted
COLING
2000
15 years 1 months ago
Unscrambling English word order
We propose a treatment of `extraposition' which allows items to be assimilated directly even when they appear far from their canonical positions. This treatment supports anal...
Allan Ramsay, Helen Seville