Sciweavers

1317 search results - page 210 / 264
» A new delay system approach to network-based control
Sort
View
AAAI
2007
13 years 11 months ago
Supporting Feedback and Assessment of Digital Ink Answers to In-Class Exercises
Effective teaching involves treating the presentation of new material and the assessment of students’ mastery of this material as part of a seamless and continuous feedback cycl...
Kimberle Koile, Kevin Chevalier, Michel Rbeiz, Ada...
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
IWCMC
2010
ACM
13 years 9 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
ICDE
1998
IEEE
121views Database» more  ICDE 1998»
14 years 10 months ago
Fuzzy Triggers: Incorporating Imprecise Reasoning into Active Databases
Traditional Event-Condition-Action triggers (active database rules) include a Boolean predicate as a trigger condition. We propose fuzzy triggers whereby fuzzy inference is utiliz...
Antoni Wolski, Tarik Bouaziz
IEEEARES
2008
IEEE
14 years 3 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...