Sciweavers

16518 search results - page 3141 / 3304
» A New Approach to Splitting-Off
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
147
Voted
ICIW
2008
IEEE
15 years 11 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
167
Voted
ICTAI
2008
IEEE
15 years 11 months ago
Information Extraction as an Ontology Population Task and Its Application to Genic Interactions
Ontologies are a well-motivated formal representation to model knowledge needed to extract and encode data from text. Yet, their tight integration with Information Extraction (IE)...
Alain-Pierre Manine, Érick Alphonse, Philip...
178
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
IJCNN
2008
IEEE
15 years 11 months ago
On-line bagging Negative Correlation Learning
— Negative Correlation Learning (NCL) has been showing to outperform other ensemble learning approaches in off-line mode. A key point to the success of NCL is that the learning o...
Fernanda L. Minku, Xin Yao
« Prev « First page 3141 / 3304 Last » Next »