Sciweavers

3913 search results - page 649 / 783
» complexity 2006
Sort
View
122
Voted
CN
2007
106views more  CN 2007»
15 years 3 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
169
Voted
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
15 years 3 months ago
A Gracefully Degrading and Energy-Efficient Modular Router Architecture for On-Chip Networks
Packet-based on-chip networks are increasingly being adopted in complex System-on-Chip (SoC) designs supporting numerous homogeneous and heterogeneous functional blocks. These Net...
Jongman Kim, Chrysostomos Nicopoulos, Dongkook Par...
ISI
2006
Springer
15 years 3 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
130
Voted
ISI
2006
Springer
15 years 3 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
119
Voted
CSDA
2007
87views more  CSDA 2007»
15 years 3 months ago
Estimation and inference in functional mixed-effects models
Functional mixed-effects models are very useful in analyzing functional data. A general functional mixed-effects model that inherits the flexibility of linear mixed-effects model...
Anestis Antoniadis, Theofanis Sapatinas