Sciweavers

4944 search results - page 854 / 989
» From XML to Relational Models
Sort
View
CSREASAM
2006
13 years 11 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
DATESO
2006
106views Database» more  DATESO 2006»
13 years 11 months ago
GeKon - Applying Novel Approaches to GIS Development
Abstract. This paper describes a few ideas concerned with geographical information systems (GIS) development. Those ideas come from a GIS development project named GeKon, which is ...
Tomas Richta
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 11 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
CLIN
2003
13 years 11 months ago
On the Statistical Consistency of DOP Estimators
A statistical estimator attempts to guess an unknown probability distribution by analyzing a sample from this distribution. One desirable property of an estimator is that its gues...
Detlef Prescher, Remko Scha, Khalil Sima'an, Andre...
FOIS
2001
13 years 11 months ago
Type-syntax and token-syntax in diagrammatic systems
The uptake in the software industry of notations for designing systems visually has been accelerated with the standardization of the Unified Modeling Language (UML). The formaliza...
John Howse, Fernando Molina, John Taylor, Sun-Joo ...