Sciweavers

786 search results - page 107 / 158
» Adequacy of Limited Testing for Knowledge Based Systems
Sort
View
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
13 years 11 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu
ICEIS
2009
IEEE
14 years 2 months ago
Creation and Maintenance of Query Expansion Rules
In an information retrieval system, a thesaurus can be used for query expansion, i.e. adding words to queries in order to improve recall. We propose a semi-automatic and interactiv...
Stefania Castellani, Aaron N. Kaplan, Fréd&...
CEC
2003
IEEE
14 years 1 months ago
An evolutionary approach for reducing the switching activity in address buses
In this paper we present two new approaches based on genetic algorithms (GA) to reduce power consumption by communication buses in an embedded system. The first approach makes it ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ICDCS
2003
IEEE
14 years 1 months ago
Decision-Support Workload Characteristics on a Clustered Database Server from the OS Perspective
A range of database services are being offered on clusters of workstations today to meet the demanding needs of applications with voluminous datasets, high computational and I/O r...
Yanyong Zhang, Jianyong Zhang, Anand Sivasubramani...