Sciweavers

7434 search results - page 193 / 1487
» Still
Sort
View
AINA
2008
IEEE
15 years 11 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 11 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
CGO
2008
IEEE
15 years 11 months ago
Compiling for vector-thread architectures
Vector-thread (VT) architectures exploit multiple forms of parallelism simultaneously. This paper describes a compiler for the Scale VT architecture, which takes advantage of the ...
Mark Hampton, Krste Asanovic
COMPSAC
2008
IEEE
15 years 11 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
CSSE
2008
IEEE
15 years 11 months ago
Constructing a Fractal P2P Network
—A Peer-to-Peer (P2P) network is a communication network constructed on application level, for the purpose of exchanging information among peers. Fractal, defined as an object or...
Changxiong Tang, Rui Wang