Sciweavers

3404 search results - page 572 / 681
» EJB Design Patterns
Sort
View
ETRICS
2006
14 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FPL
2006
Springer
120views Hardware» more  FPL 2006»
14 years 1 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
GECCO
2006
Springer
128views Optimization» more  GECCO 2006»
14 years 1 months ago
FTXI: fault tolerance XCS in integer
In the realm of data mining, several key issues exists in the traditional classification algorithms, such as low readability, large rule number, and low accuracy with information ...
Hong-Wei Chen, Ying-Ping Chen
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
14 years 1 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad
APSEC
2001
IEEE
14 years 1 months ago
Formal Specification of Mixed Components with Korrigan
Formal specifications are now widely accepted in software development. Recently, the need for a separation of concerns with reference to static and dynamic aspects appeared. Furth...
Christine Choppy, Pascal Poizat, Jean-Claude Royer