Sciweavers

3196 search results - page 530 / 640
» Knowledge Acquisition for Knowledge Management
Sort
View
IEEESCC
2006
IEEE
14 years 1 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
SYNASC
2006
IEEE
91views Algorithms» more  SYNASC 2006»
14 years 1 months ago
MATHsAiD: A Mathematical Theorem Discovery Tool
In the eld of automated reasoning, one of the most challenging (even if, perhaps, somewhat overlooked) problems thus far has been to develop a means of discerning, from amongst al...
Roy L. McCasland, Alan Bundy
CONEXT
2006
ACM
14 years 1 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack
DOLAP
2006
ACM
14 years 1 months ago
HYPE: mining hierarchical sequential patterns
Mining data warehouses is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, historized ...
Marc Plantevit, Anne Laurent, Maguelonne Teisseire