Sciweavers

4187 search results - page 729 / 838
» A Taxonomy of Model Transformation
Sort
View
CCS
2003
ACM
14 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
ICWE
2003
Springer
14 years 3 months ago
Hera: Development of Semantic Web Information Systems
Abstract. As a consequence of the success of the Web, methodologies for information system development need to consider systems that use the Web paradigm. These Web Information Sys...
Geert-Jan Houben, Peter Barna, Flavius Frasincar, ...
IEAAIE
2003
Springer
14 years 3 months ago
Fast Feature Selection by Means of Projections
The attribute selection techniques for supervised learning, used in the preprocessing phase to emphasize the most relevant attributes, allow making models of classification simple...
Roberto Ruiz, José Cristóbal Riquelm...

Publication
336views
14 years 3 months ago
A Discriminative approach for Wavelet Shrinkage Denoising
This paper suggests a discriminative approach for wavelet denoising where a set of mapping functions (MF) are applied to the transform coefficients in an attempt to produce a noi...
Yacov Hel-Or and Doron Shaked