Sciweavers

11376 search results - page 2190 / 2276
» Willow System Demonstration
Sort
View
110
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 6 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
105
Voted
CIA
2004
Springer
15 years 6 months ago
Agent's Multiple Inquiries for Enhancing the Partnership Formation Process
The concept of sequential two-sided search is widely used in partnerships formation applications in various domains. However, when considering the implementation of the method in M...
David Sarne, Sarit Kraus
CSL
2004
Springer
15 years 6 months ago
The Boundary Between Decidability and Undecidability for Transitive-Closure Logics
To reason effectively about programs, it is important to have some version of a transitive-closure operator so that we can describe such notions as the set of nodes reachable from ...
Neil Immerman, Alexander Moshe Rabinovich, Thomas ...
118
Voted
ECOOP
2004
Springer
15 years 6 months ago
Evolvable Pattern Implementations Need Generic Aspects
Design patterns are a standard means to create large software systems. However, with standard object-oriented techniques, typical implementations of such patterns are not themselv...
Günter Kniesel, Tobias Rho, Stefan Hanenberg
125
Voted
ICSOC
2004
Springer
15 years 6 months ago
Assured service quality by improved fault management
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today’s event correlation mainly addresses the cor...
Andreas Hanemann, Martin Sailer, David Schmitz
« Prev « First page 2190 / 2276 Last » Next »