Sciweavers

7150 search results - page 1342 / 1430
» Graph-Based Data Mining
Sort
View
ICEIS
2008
IEEE
14 years 3 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
ICSM
2008
IEEE
14 years 3 months ago
Automated severity assessment of software defect reports
In mission critical systems, such as those developed by NASA, it is very important that the test engineers properly recognize the severity of each issue they identify during testi...
Tim Menzies, Andrian Marcus
IEEEPACT
2008
IEEE
14 years 3 months ago
The PARSEC benchmark suite: characterization and architectural implications
This paper presents and characterizes the Princeton Application Repository for Shared-Memory Computers (PARSEC), a benchmark suite for studies of Chip-Multiprocessors (CMPs). Prev...
Christian Bienia, Sanjeev Kumar, Jaswinder Pal Sin...
IJCNN
2008
IEEE
14 years 3 months ago
A neural network approach to ordinal regression
— Ordinal regression is an important type of learning, which has properties of both classification and regression. Here we describe an effective approach to adapt a traditional ...
Jianlin Cheng, Zheng Wang, Gianluca Pollastri
ICALT
2007
IEEE
14 years 3 months ago
The Design of e-Learning Environment Oriented for Personalized Adaptability
A design of e-Learning environment is described for personalized adaptability. At first, we explain the whole system of our learning management system, WebClass RAPSODY, which has...
Toshie Ninomiya, Ken Nakayama, Miyuki Shimizu, Fum...
« Prev « First page 1342 / 1430 Last » Next »