Sciweavers

3319 search results - page 343 / 664
» Type Theoretical Databases
Sort
View
137
Voted
ACSC
2005
IEEE
15 years 9 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
133
Voted
ACSC
2005
IEEE
15 years 9 months ago
Cloth Animation with Adaptively Refined Meshes
Cloth animation is a very expensive process in terms of computational cost, due to the flexible nature of cloth objects. Since wrinkles and smooth areas co-exist commonly in cloth...
Ling Li, Vasily Volkov
140
Voted
CAISE
2005
Springer
15 years 9 months ago
An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data
The notion of spatio-temporal multi-granularity is fundamental when modeling objects in GIS applications in that it supports the representation of the temporal evolutions of these ...
Elisa Bertino, Dolores Cuadra, Paloma Martí...
ECML
2005
Springer
15 years 9 months ago
Machine Learning of Plan Robustness Knowledge About Instances
Abstract. Classical planning domain representations assume all the objects from one type are exactly the same. But when solving problems in the real world systems, the execution of...
Sergio Jiménez, Fernando Fernández, ...
99
Voted
ICALP
2005
Springer
15 years 9 months ago
Optimistic Asynchronous Atomic Broadcast
This paper presents a new protocol for atomic broadcast in an asynchronous network with a maximal number of Byzantine failures. It guarantees both safety and liveness without maki...
Klaus Kursawe, Victor Shoup