Sciweavers

42738 search results - page 8514 / 8548
» Search Computing Systems
Sort
View
IJDE
2007
123views more  IJDE 2007»
15 years 13 days ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
103
Voted
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
15 years 13 days ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
88
Voted
IJMI
2007
86views more  IJMI 2007»
15 years 13 days ago
Using argumentation to extract key sentences from biomedical abstracts
s from Biomedical Abstracts Patrick Rucha , Celia Boyer c , Christine Chichesterb , Imad Tbahritiab Antoine Geissbühlera , Paul Fabrya , Julien Gobeilla , Violaine Pilletab , Diet...
Patrick Ruch, Célia Boyer, Christine Chiche...
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 13 days ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IJON
2007
184views more  IJON 2007»
15 years 13 days ago
Convex incremental extreme learning machine
Unlike the conventional neural network theories and implementations, Huang et al. [Universal approximation using incremental constructive feedforward networks with random hidden n...
Guang-Bin Huang, Lei Chen
« Prev « First page 8514 / 8548 Last » Next »