Sciweavers

6025 search results - page 1106 / 1205
» Flexibility in Service Processes
Sort
View
135
Voted
FASE
2006
Springer
15 years 7 months ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
118
Voted
ACSAC
2001
IEEE
15 years 7 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
147
Voted
ALT
2000
Springer
15 years 7 months ago
Computationally Efficient Transductive Machines
In this paper1 we propose a new algorithm for providing confidence and credibility values for predictions on a multi-class pattern recognition problem which uses Support Vector mac...
Craig Saunders, Alexander Gammerman, Volodya Vovk
154
Voted
NGC
2000
Springer
109views Communications» more  NGC 2000»
15 years 7 months ago
Router level filtering for receiver interest delivery
Delivering data to on-line game participants requires the game data to be "customized" in real-time to each participant's characteristics. Using multicast in such a...
Manuel M. Oliveira, Jon Crowcroft, Christophe Diot
144
Voted
CSFW
1995
IEEE
15 years 7 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
« Prev « First page 1106 / 1205 Last » Next »