Sciweavers

26 search results - page 3 / 6
» Determining Severity and Recommendations in Process Non-Conf...
Sort
View
AAAI
1998
13 years 11 months ago
Handling Inconsistency for Multi-Source Integration
The overwhelming amount of information sources now available through the internet has increased the need to combine or integrate the data retrieved from these sources in an intell...
Sheila Tejada, Craig A. Knoblock, Steven Minton
ICCS
2007
Springer
14 years 4 months ago
Impact of QoS on Replica Placement in Tree Networks
This paper discusses and compares several policies to place replicas in tree networks, subject to server capacity and QoS constraints. The client requests are known beforehand, wh...
Anne Benoit, Veronika Rehn, Yves Robert
JCT
2000
111views more  JCT 2000»
13 years 9 months ago
Immanants and Finite Point Processes
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
Persi Diaconis, Steven N. Evans
IWSOS
2007
Springer
14 years 4 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
TSD
2010
Springer
13 years 8 months ago
Diagnostics for Debugging Speech Recognition Systems
Modern speech recognition applications are becoming very complex program packages. To understand the error behaviour of the ASR systems, a special diagnosis - a procedure or a tool...
Milos Cernak