Sciweavers

493 search results - page 36 / 99
» types 1998
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
SIGMOD
1998
ACM
150views Database» more  SIGMOD 1998»
15 years 4 months ago
Extracting Schema from Semistructured Data
Semistructured data is characterized by the lack of any fixed and rigid schema, although typically the data hassomeimplicitstructure. While thelack offixedschemamakesextracting ...
Svetlozar Nestorov, Serge Abiteboul, Rajeev Motwan...
IFL
1998
Springer
139views Formal Methods» more  IFL 1998»
15 years 4 months ago
Higher Order Demand Propagation
Abstract. In this report a new backward strictness analysis for functional languages is presented. It is called higher order demand propagation and is applicable to a realistic non...
Dirk Pape
TCS
1998
14 years 11 months ago
Axiomatisation of Functional Dependencies in Incomplete Relations
Incomplete relations are relations which contain null values, whose meaning is \value is at present unknown". Such relations give rise to two types of functional dependency (...
Mark Levene, George Loizou
TNN
1998
254views more  TNN 1998»
14 years 11 months ago
Comparative analysis of fuzzy ART and ART-2A network clustering performance
—Adaptive resonance theory (ART) describes a family of self-organizing neural networks, capable of clustering arbitrary sequences of input patterns into stable recognition codes....
T. Frank, Karl-Friedrich Kraiss, Torsten Kuhlen