Sciweavers

8772 search results - page 1639 / 1755
» Business Services Networks
Sort
View
IEEEIAS
2009
IEEE
14 years 5 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
WDAG
2009
Springer
154views Algorithms» more  WDAG 2009»
14 years 5 months ago
Compact Multicast Routing
In a distributed network, a compact multicast scheme is a routing scheme that allows any source to send messages to any set of targets. We study the trade-off between the space us...
Ittai Abraham, Dahlia Malkhi, David Ratajczak
EPEW
2009
Springer
14 years 5 months ago
Performance of Auctions and Sealed Bids
We develop models of automated E-commerce techniques, which predict the economic outcomes of these decision mechanisms, including the price attained by a good and the resulting inc...
Erol Gelenbe, László Györfi
ERCIMDL
2009
Springer
167views Education» more  ERCIMDL 2009»
14 years 5 months ago
Conceptual Discovery of Educational Resources through Learning Objectives
This poster reports on current work with the NSF-funded Achievement Standards Network (ASN) to support discovery of educational resources in digital libraries using conceptual grap...
Stuart A. Sutton, Diny Golder
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
14 years 5 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
« Prev « First page 1639 / 1755 Last » Next »