Sciweavers

885 search results - page 144 / 177
» Process Patterns for COTS-Based Development
Sort
View
IJCAI
1989
15 years 3 months ago
Approximation of Indistinct Concepts
This theory on semi-equivalence r e l a t i o n s is an important and useful tool for i n v e s t i g a t i n g c l a s s i f i c a t i o n , pattern r e c o g n i t i o n , p o l...
Zhang Mingyi
122
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 2 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 2 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
SCP
2008
144views more  SCP 2008»
15 years 2 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
RITA
2006
302views more  RITA 2006»
15 years 2 months ago
Content-Based Image Retrieval: Theory and Applications
: Advances in data storage and image acquisition technologies have enabled the creation of large image datasets. In this scenario, it is necessary to develop appropriate informatio...
Ricardo da Silva Torres, Alexandre X. Falcã...