Sciweavers

286 search results - page 22 / 58
» A Method of Managing Complex Fuzzy Information
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
TSC
2008
91views more  TSC 2008»
13 years 7 months ago
Selective Querying for Adapting Web Service Compositions Using the Value of Changed Information
Web service composition (WSC) techniques assume that the parameters used to model the environment remain static and accurate throughout the composition's execution. However, W...
John Harney, Prashant Doshi
MIDDLEWARE
2001
Springer
14 years 5 hour ago
Thread Transparency in Information Flow Middleware
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...
CAISE
2008
Springer
13 years 9 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
ICUIMC
2009
ACM
14 years 2 months ago
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data
Although documents have hundreds of thousands of unique words, only a small number of words are significantly useful for intelligent services. For this reason, feature extraction ...
Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee