Sciweavers

1231 search results - page 184 / 247
» Association Rules
Sort
View
INTERNET
2007
113views more  INTERNET 2007»
13 years 7 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
VIS
2009
IEEE
246views Visualization» more  VIS 2009»
14 years 9 months ago
Supercubes: A High-Level Primitive for Diamond Hierarchies
Abstract-- Volumetric datasets are often modeled using a multiresolution approach based on a nested decomposition of the domain into a polyhedral mesh. Nested tetrahedral meshes ge...
Kenneth Weiss, Leila De Floriani
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 8 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 2 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
DSOM
2003
Springer
14 years 28 days ago
Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management
Systems are becoming exceedingly complex to manage. As such, there is an increasing trend towards developing systems that are self-managing. Policy-based infrastructures have been ...
Sandeep Uttamchandani, Carolyn L. Talcott, David P...