Sciweavers

292 search results - page 12 / 59
» Exploiting Dead Value Information
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
PIMRC
2008
IEEE
14 years 1 months ago
Channel state information based LLR clipping in list MIMO detection
—Suboptimal detection schemes, such as list MIMO detection, often face the challenge of having to “guess” at the decision reliability for some of the detected bits. A simple ...
David L. Milliner, Ernesto Zimmermann, John R. Bar...
BTW
2007
Springer
191views Database» more  BTW 2007»
14 years 1 months ago
The Information Integrator: Using Semantic Technology to provide a single view to distributed data
: For the integration of data that resides in autonomous data sources Software AG uses ontologies. Data source ontologies describe the data sources themselves. Business ontologies ...
Jürgen Angele, Michael Gesmann
KRDB
2003
184views Database» more  KRDB 2003»
13 years 8 months ago
Some Practical Issues in Building a Hybrid Deductive Geographic Information System with a DL Component
We report about some preliminary issues from the DFG project “Description Logics and Spatial Reasoning” (“DLS”, DFG Grant NE 279/8-1), one of whose goals is to develop a p...
Michael Wessel
ICML
1998
IEEE
14 years 8 months ago
Learning Collaborative Information Filters
Predicting items a user would like on the basis of other users' ratings for these items has become a well-established strategy adopted by many recommendation services on the ...
Daniel Billsus, Michael J. Pazzani