Sciweavers

1170 search results - page 177 / 234
» Experience with Ripple-Down Rules
Sort
View
AINA
2008
IEEE
14 years 4 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung
EDOC
2008
IEEE
14 years 4 months ago
On Creating Industry-Wide Reference Architectures
Many industries have been developing e-business standards to improve business-to-business interoperability on a mass scale. Most such standards are composed of business data model...
Liming Zhu, Mark Staples, Vladimir Tosic
ICRA
2008
IEEE
123views Robotics» more  ICRA 2008»
14 years 4 months ago
Iterated filters for bearing-only SLAM
— This paper discusses the importance of iteration when performing the measurement update step for the problem of bearing-only SLAM. We focus on an undelayed approach that initia...
Stephen Tully, Hyungpil Moon, George Kantor, Howie...
IEEEARES
2008
IEEE
14 years 4 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
INFOCOM
2008
IEEE
14 years 4 months ago
Detecting Anomalies Using End-to-End Path Measurements
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi