Sciweavers

2269 search results - page 361 / 454
» Behavioral Intrusion Detection
Sort
View
RWEB
2007
Springer
14 years 4 months ago
Reactive Rules on the Web
Reactive rules are used for programming rule-based, reactive systems, which have the ability to detect events and respond to them automatically in a timely manner. Such systems are...
Bruno Berstel, Philippe Bonnard, François B...
ANSS
2006
IEEE
14 years 4 months ago
A Simulation and Decision Framework for Selection of Numerical Solvers in
Selecting the right numerical solver or the most appropriate numerical package for a particular simulation problem it is increasingly difficult for users without an extensive math...
Peter Bunus
NCA
2006
IEEE
14 years 4 months ago
A Primary-Backup Protocol for In-Memory Database Replication
The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control...
Lásaro J. Camargos, Fernando Pedone, Rodrig...
ADBIS
2006
Springer
90views Database» more  ADBIS 2006»
14 years 4 months ago
Finding Communities in Site Web-Graphs and Citation Graphs
The Web is a typical example of a social network. One of the most intriguing features of the Web is its self-organization behavior, which is usually faced through the existence of ...
Antonis Sidiropoulos
ACISICIS
2005
IEEE
14 years 3 months ago
A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems
Ubiquitous computing is viewed as a computing paradigm where minimal user intervention is necessitated emphasizing detection of environmental conditions and user behaviors in orde...
Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young...