Sciweavers

2834 search results - page 474 / 567
» Representing Trees with Constraints
Sort
View
120
Voted
CCS
2003
ACM
15 years 5 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
83
Voted
IBPRIA
2003
Springer
15 years 5 months ago
Regularization of 3D Cylindrical Surfaces
In this paper we present a method for the regularization of 3D cylindrical surfaces. By a cylindrical surface we mean a 3D surface that can be expressed as an application S(l, θ) ...
Luis Álvarez, Carmelo Cuenca, Javier S&aacu...
116
Voted
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 5 months ago
A Smart Space application to dynamically relate medical and environmental information
— In this paper we present a cross-domain application for ambient and health monitoring. The system architecture is intended to be openly extensible in order to fulfil unanticipa...
Fabio Vergari, Sara Bartolini, Federico Spadini, A...
95
Voted
WEBDB
2010
Springer
143views Database» more  WEBDB 2010»
15 years 5 months ago
Querying Wikipedia Documents and Relationships
Wikipedia has become an important source of information which is growing very rapidly. However, the existing infrastructure for querying this information is limited and often igno...
Huong Nguyen, Thanh Nguyen, Hoa Nguyen, Juliana Fr...
85
Voted
DANCE
2002
IEEE
15 years 5 months ago
Towards Self-Configuring Networks
Current networks require ad-hoc operating procedures by expert administrators to handle changes. These configuration management operations are costly and error prone. Active netwo...
Alexander V. Konstantinou, Danilo Florissi, Yechia...