Sciweavers

6455 search results - page 992 / 1291
» Research problems
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
BROADNETS
2004
IEEE
15 years 8 months ago
Diverse Routing for Shared Risk Resource Groups (SRRG) Failures in WDM Optical Networks
Failure resilience is one of the desired features of the Internet. Most of the traditional restoration architectures are based on single-failure assumption which is unrealistic. M...
Pallab Datta, Arun K. Somani
APNOMS
2006
Springer
15 years 8 months ago
Delivery and Storage Architecture for Sensed Information Using SNMP
Many researches on context aware computing are carried out around the world. Among them, Context-Toolkit and Semantic Space provide separation of concerns between sensor and applic...
Deokjai Choi, Hongseok Jang, Kugsang Jeong, Punghy...
CINQ
2004
Springer
116views Database» more  CINQ 2004»
15 years 8 months ago
A Survey on Condensed Representations for Frequent Sets
Abstract. Solving inductive queries which have to return complete collections of patterns satisfying a given predicate has been studied extensively the last few years. The specific...
Toon Calders, Christophe Rigotti, Jean-Franç...
ATAL
2006
Springer
15 years 8 months ago
Reducing costly information acquisition in auctions
Most research on auctions assumes that potential bidders have private information about their willingness to pay for the item being auctioned, and that they use this information s...
Kate Larson