Sciweavers

3737 search results - page 633 / 748
» Knowledge Management and Promises
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
SYNASC
2006
IEEE
91views Algorithms» more  SYNASC 2006»
14 years 1 months ago
MATHsAiD: A Mathematical Theorem Discovery Tool
In the eld of automated reasoning, one of the most challenging (even if, perhaps, somewhat overlooked) problems thus far has been to develop a means of discerning, from amongst al...
Roy L. McCasland, Alan Bundy
CONEXT
2006
ACM
14 years 1 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack
DOLAP
2006
ACM
14 years 1 months ago
HYPE: mining hierarchical sequential patterns
Mining data warehouses is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, historized ...
Marc Plantevit, Anne Laurent, Maguelonne Teisseire
ELPUB
2006
ACM
14 years 1 months ago
Living Reviews - Innovative Resources for Scholarly Communication Bridging Diverse Spheres of Disciplines and Organisational Str
This contribution presents the concept and analyses the path of diffusion of an innovative publishing idea that originated in one speciality in physics and is now about to spread ...
Claus Dalchow, Michael Nentwich, Patrick Scherhauf...