Sciweavers

1998 search results - page 323 / 400
» Basic Association Rules
Sort
View
IRI
2005
IEEE
14 years 3 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
RTAS
2005
IEEE
14 years 3 months ago
A Platform-Independent Component Modeling Language for Distributed Real-Time and Embedded Systems
This paper provides two contributions to the study of developing and applying domain-specific modeling languages (DSMLS) to distributed real-time and embedded (DRE) systems – p...
Krishnakumar Balasubramanian, Jaiganesh Balasubram...
WCFLP
2005
ACM
14 years 3 months ago
A declarative debugger of incorrect answers for constraint functional-logic programs
Debugging is one of the essential parts of the software development cycle. However, the usual debugging techniques used in imperative languages such as the step by step execution ...
Rafael Caballero
CAISE
2005
Springer
14 years 3 months ago
Query Processing Using Ontologies
Abstract. Recently, the database and AI research communities have paid increased attention to ontologies. The main motivating reason is that ontologies promise solutions for comple...
Chokri Ben Necib, Johann Christoph Freytag
EMSOFT
2005
Springer
14 years 3 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...