Sciweavers

102 search results - page 19 / 21
» A Component Framework for Document-Centric Network Processin...
Sort
View
MAGS
2008
191views more  MAGS 2008»
13 years 7 months ago
Consensus ontologies in socially interacting MultiAgent systems
This paper presents approaches for building, managing, and evaluating consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent h...
Ergun Biçici
ECBS
1996
IEEE
155views Hardware» more  ECBS 1996»
13 years 12 months ago
Model-Integrated Program Synthesis Environment
In this paper, it is shown that, through the use of Model-Integrated Program Synthesis MIPS, parallel real-time implementations of image processing data ows can be synthesized fro...
Janos Sztipanovits, Gabor Karsai, Hubertus Franke
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 7 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
WOWMOM
2009
ACM
188views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Mobility management for NGN WiMAX: Specification and implementation
The anticipated deployment of IEEE 802.16-based wireless metropolitan area networks (WMANs) will usher a new era in broadband wireless communications. The adoption of the WiMAX te...
Pedro Neves, Ricardo Matos, Bruno Sousa, Giada Lan...
RAID
1999
Springer
14 years 4 hour ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo