Sciweavers

1441 search results - page 93 / 289
» A Practical Approach to Network-Based Processing
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
15 years 3 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
120
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Compressed sensing radar
A stylized compressed sensing radar is proposed in which the timefrequency plane is discretized into an N × N grid. Assuming the number of targets K is small (i.e., K N2 ), then ...
Matthew A. Herman, Thomas Strohmer
94
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Rate-adaptive codes for the entire Slepian-Wolf region and arbitrarily correlated sources
In this paper, we focus on the design of distributed source codes that can achieve any point in the Slepian-Wolf (SW) region and at the same time adapt to any correlation between ...
Velotiaray Toto-Zarasoa, Aline Roumy, Christine Gu...
CAISE
2005
Springer
15 years 8 months ago
Development of a formal REA-ontology Representation
Business domain ontologies offer great opportunities for facilitating communication between people in business, for improving the enterprise system engineering processes and for cr...
Frederik Gailly, Geert Poels
119
Voted
ACL
2006
15 years 3 months ago
An Intermediate Representation for the Interpretation of Temporal Expressions
The interpretation of temporal expressions in text is an important constituent task for many practical natural language processing tasks, including question-answering, information...
Pawel P. Mazur, Robert Dale