Sciweavers

1404 search results - page 244 / 281
» Complexity of admissible rules
Sort
View
CN
2007
106views more  CN 2007»
13 years 8 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
CORR
2007
Springer
75views Education» more  CORR 2007»
13 years 8 months ago
Wavelet Based Semi-blind Channel Estimation For Multiband OFDM
— This paper introduces an expectation-maximization (EM) algorithm within a wavelet domain Bayesian framework for semi-blind channel estimation of multiband OFDM based UWB commun...
Sajad Sadough, Mahieddine Ichir, Emmanuel Jaffrot,...
JCM
2006
60views more  JCM 2006»
13 years 8 months ago
A Harmful Interference Model for Unlicensed Device Operation in Licensed service Bands
Recent FCC proceedings have considered the notion of unlicensed device operation in licensed bands. Licensed users are concerned about harmful interference while unlicensed device ...
Timothy X. Brown
JCP
2006
100views more  JCP 2006»
13 years 8 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
LOGCOM
2008
133views more  LOGCOM 2008»
13 years 8 months ago
Linking Semantic and Knowledge Representations in a Multi-Domain Dialogue System
We describe a two-layer architecture for supporting semantic interpretation and domain reasoning in dialogue systems. Building systems that support both semantic interpretation an...
Myroslava Dzikovska, James F. Allen, Mary D. Swift