Sciweavers

383 search results - page 30 / 77
» Knowledge Integration as a Key Problem in an ERP Implementat...
Sort
View
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
INFORMATICALT
1998
84views more  INFORMATICALT 1998»
13 years 7 months ago
Preprocessing of Folk Song Acoustic Records for Transcription into Music Scores
This paper describes a preliminary algorithm performing the mapping of sound to music score. Our procedure is constructed over signal-extracted energy and fundamental frequency tra...
Gailius Raskinis
IEAAIE
2010
Springer
13 years 5 months ago
Tabu Search with Consistent Neighbourhood for Strip Packing
This paper introduces a new tabu search algorithm for a strip packing problem. It integrates several key features: A consistent neighborhood, a fitness function including problem k...
Giglia Gómez-Villouta, Jean-Philippe Hamiez...
KES
2008
Springer
13 years 7 months ago
Ontology-Based Design Pattern Recognition
This paper presents ontology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontolog...
Damir Kirasic, Danko Basch
ICDT
2003
ACM
150views Database» more  ICDT 2003»
14 years 23 days ago
Bioinformatics Adventures in Database Research
Informatics has helped launch molecular biology into the genomic era. It appears certain that informatics will remain a major contributor to molecular biology in the post-genome er...
Jinyan Li, See-Kiong Ng, Limsoon Wong