Sciweavers

1022 search results - page 72 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
RAID
2004
Springer
15 years 3 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
SPIESR
1997
143views Database» more  SPIESR 1997»
14 years 11 months ago
Similarity Evaluation in Image Retrieval Using Simple Features
The development of increasingly complex multimedia applications calls for new methodologies for the organization and retrieval of still images and video sequences. Query and retri...
Eugenio Di Sciascio, Augusto Celentano
ICAC
2005
IEEE
15 years 3 months ago
Decentralised Autonomic Computing: Analysing Self-Organising Emergent Behaviour using Advanced Numerical Methods
When designing decentralised autonomic computing systems, a fundamental engineering issue is to assess systemwide behaviour. Such decentralised systems are characterised by the la...
Tom De Wolf, Giovanni Samaey, Tom Holvoet, Dirk Ro...
ACSC
2005
IEEE
15 years 3 months ago
A Simulation Framework for Knowledge Acquisition Evaluation
Knowledge acquisition (KA) plays an important role in building knowledge based systems (KBS). However, evaluating different KA techniques has been difficult because of the costs...
Tri M. Cao, Paul Compton
EUROPAR
2010
Springer
14 years 10 months ago
Meaningful Metrics for Evaluating Eventual Consistency
Abstract. Optimistic replication is a fundamental technique for supporting collaborative work practices in mobile environments. However, eventual consistency, in contrast to immedi...
João Barreto, Paulo Ferreira