Sciweavers

2385 search results - page 397 / 477
» Knowledge Refinement for a Design System
Sort
View
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
14 years 12 days ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
FAST
2009
13 years 6 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
DGO
2011
237views Education» more  DGO 2011»
12 years 8 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
14 years 9 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
DIM
2006
ACM
14 years 2 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...