Sciweavers

699 search results - page 86 / 140
» A Computational Model for Functional Logic Deductive Databas...
Sort
View
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
HT
2004
ACM
14 years 1 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
VLSID
2005
IEEE
255views VLSI» more  VLSID 2005»
14 years 8 months ago
Estimation of Switching Activity in Sequential Circuits Using Dynamic Bayesian Networks
We propose a novel, non-simulative, probabilistic model for switching activity in sequential circuits, capturing both spatio-temporal correlations at internal nodes and higher ord...
Sanjukta Bhanja, Karthikeyan Lingasubramanian, N. ...
AB
2008
Springer
14 years 2 months ago
Property Preservation along Embedding of Biological Regulatory Networks
In the course of understanding biological regulatory networks (BRN), scientists usually start by studying small BRNs that they believe to be of particular importance to represent a...
Mbarka Mabrouki, Marc Aiguier, Jean-Paul Comet, Pa...
SSDBM
2010
IEEE
188views Database» more  SSDBM 2010»
14 years 24 days ago
Similarity Estimation Using Bayes Ensembles
Similarity search and data mining often rely on distance or similarity functions in order to provide meaningful results and semantically meaningful patterns. However, standard dist...
Tobias Emrich, Franz Graf, Hans-Peter Kriegel, Mat...