Sciweavers

1429 search results - page 202 / 286
» An Overview of the Annex System
Sort
View
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SAFECOMP
2009
Springer
14 years 4 months ago
Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
SEMWEB
2009
Springer
14 years 4 months ago
ASMOV: Results for OAEI 2009
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
ICDS
2008
IEEE
14 years 4 months ago
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...
Thomas Dreibholz, Erwin P. Rathgeb
IPPS
2008
IEEE
14 years 4 months ago
On synthesizing workloads emulating MPI applications
Evaluation of high performance parallel systems is a delicate issue, due to the difficulty of generating workloads that represent, with fidelity, those that will run on actual sys...
Javier Navaridas, José Miguel-Alonso, Franc...