Sciweavers

2642 search results - page 315 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
15 years 8 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...
FUZZY
1997
Springer
260views Fuzzy Logic» more  FUZZY 1997»
15 years 8 months ago
Forecasting Sales Using Neural Networks
Abstract. In this paper, neural networks trained with the back-propagation algorithm are applied to predict the future values of time series that consist of the weekly demand on it...
Frank M. Thiesing, Oliver Vornberger
162
Voted
DEBS
2009
ACM
15 years 8 months ago
Efficient event-based resource discovery
The ability to find services or resources that satisfy some criteria is an important aspect of distributed systems. This paper presents an event-based architecture to support more...
Wei Yan, Songlin Hu, Vinod Muthusamy, Hans-Arno Ja...
GSEM
2007
Springer
15 years 8 months ago
Mapping of SLA-based Workflows with light Communication onto Grid Resources
Service Level Agreements (SLAs) are currently one of the major research topics in Grid Computing. Among those system components that support SLA-aware Grid jobs, the SLA mapping me...
Dang Minh Quan, Jörn Altmann