Sciweavers

1183 search results - page 125 / 237
» Risk Management with Benchmarking
Sort
View
IWIA
2006
IEEE
15 years 10 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
VLDB
1998
ACM
116views Database» more  VLDB 1998»
15 years 8 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ATAL
2006
Springer
15 years 8 months ago
A Market-Pressure-Based Performance Evaluator for TAC-SCM
Abstract. This paper proposes a novel method to characterize the performance of autonomous agents in the Trading Agent Competition for Supply Chain Management (TAC-SCM). We create ...
Brett Borghetti, Eric Sodomka, Maria L. Gini, John...
AAAI
2006
15 years 5 months ago
Performance Evaluation Methods for the Trading Agent Competition
This paper proposes a novel method to characterize the performance of autonomous agents in the Trading Agent Competition for Supply Chain Management (TAC-SCM). We create benchmark...
Brett Borghetti, Eric Sodomka
CAP
2010
14 years 11 months ago
Parallel sparse polynomial division using heaps
We present a parallel algorithm for exact division of sparse distributed polynomials on a multicore processor. This is a problem with significant data dependencies, so our solutio...
Michael B. Monagan, Roman Pearce