Sciweavers

708 search results - page 127 / 142
» Improving Mining Quality by Exploiting Data Dependency
Sort
View
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
PIMRC
2008
IEEE
14 years 1 months ago
Adaptive radio resource management for a cellular system with fixed relay nodes
— Future mobile communications systems demand for higher data rates and service quality compared to state-of-the-art systems. One way to achieve this ambitious goal is to use rel...
Fredrik Boye, Peter Rost, Gerhard Fettweis
WECWIS
2006
IEEE
114views ECommerce» more  WECWIS 2006»
14 years 1 months ago
Large-Scale Service Composition in Semantic Service Discovery
Self-Healing and self-optimizing service based applications are important steps towards the self-organizing Service Oriented Architectures (SOA). Self-Organizing SOAs replace serv...
Steffen Bleul, Thomas Weise, Kurt Geihs
ECRTS
2003
IEEE
14 years 24 days ago
Fault-Tolerant Clock Synchronization for Embedded Distributed Multi-Cluster Systems
When time-triggered (TT) systems are to be deployed for large embedded real-time (RT) control systems in cars and airplanes, one way to overcome bandwidth limitations and achieve ...
Michael Paulitsch, Wilfried Steiner
EWCBR
2006
Springer
13 years 11 months ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild