Sciweavers

2722 search results - page 457 / 545
» Hastily formed networks
Sort
View
SEMWEB
2009
Springer
14 years 5 months ago
Optimizing Web Service Composition While Enforcing Regulations
Abstract. To direct automated Web service composition, it is compelling to provide a template, workflow or scaffolding that dictates the ways in which services can be composed. I...
Shirin Sohrabi, Sheila A. McIlraith
CEC
2008
IEEE
14 years 5 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CISIM
2008
IEEE
14 years 5 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
EMS
2008
IEEE
14 years 5 months ago
Rough Set Generating Prediction Rules for Stock Price Movement
This paper presents rough sets generating prediction rules scheme for stock price movement. The scheme was able to extract knowledge in the form of rules from daily stock movement...
Hameed Al-Qaheri, Shariffah Zamoon, Aboul Ella Has...
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 5 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi