Sciweavers

3686 search results - page 531 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
JSS
2002
198views more  JSS 2002»
13 years 9 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
VLDB
2008
ACM
102views Database» more  VLDB 2008»
14 years 9 months ago
Extending DBMSs with satellite databases
Abstract In this paper we propose an extensible architecture for database engines where satellite databases are used to scale out and implement additional functionality for a centr...
Christian Plattner, Gustavo Alonso, M. Tamer Özsu
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 9 months ago
Integer-Forcing Linear Receivers
Abstract--Linear receivers are often used to reduce the implementation complexity of multiple antenna systems. In a traditional linear receiver architecture, the receive antennas a...
Jiening Zhan, Bobak Nazer, Uri Erez, Michael Gastp...
IJSEKE
2006
99views more  IJSEKE 2006»
13 years 9 months ago
Weaving Deployment Aspects into Domain-specific Models
pecific models increase the level of abstraction used to develop large-scale component-based systems. Model-driven development (MDD) approaches (e.g., ModelIntegrated Computing and...
Krishnakumar Balasubramanian, Aniruddha S. Gokhale...
ECAI
1998
Springer
14 years 1 months ago
The Neural Path to Dialogue Acts
This paper presents a neural network approach to the problem of nding the dialogue act for a given utterance. So far only symbolic, decision tree and statistical approaches were ut...
M. Kipp