Sciweavers

2236 search results - page 278 / 448
» Intrusion detection techniques and approaches
Sort
View
OOPSLA
2010
Springer
13 years 9 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca
SEMWEB
2010
Springer
13 years 8 months ago
Exploiting Relation Extraction for Ontology Alignment
When multiple ontologies are used within one application system, aligning the ontologies is a prerequisite for interoperability and unhampered semantic navigation and search. Vario...
Elena Beisswanger
KDD
2012
ACM
164views Data Mining» more  KDD 2012»
12 years 1 months ago
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Blockmodelling is an important technique for decomposing graphs into sets of roles. Vertices playing the same role have similar patterns of interactions with vertices in other rol...
Jeffrey Chan, Wei Liu, Christopher Leckie, James B...
IPPS
2005
IEEE
14 years 4 months ago
A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance
Traditional techniques for building dependable, highperformance distributed systems are too expensive for most non-critical systems, often causing dependability to be sidelined as...
Vikram S. Adve, Adnan Agbaria, Matti A. Hiltunen, ...
ITC
1997
IEEE
129views Hardware» more  ITC 1997»
14 years 2 months ago
On Using Machine Learning for Logic BIST
This paper presents a new approach for designing test sequences to be generated on–chip. The proposed technique is based on machine learning, and provides a way to generate effi...
Christophe Fagot, Patrick Girard, Christian Landra...