Sciweavers

2306 search results - page 387 / 462
» Modeling issues in a shipping system
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Process-Centric Approach for Coordinating Product Configuration Decisions
In product family approaches such as software product lines, product configuration is a key activity that deals with the constrained combination and parameterization of reusable c...
Marcílio Mendonça, Donald D. Cowan, ...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 3 months ago
On the Approximation of the Linear Combination of Log-Normal RVs via Pearson Type IV Distribution: Application to UWB Performanc
— Approximating the sum of Log–Normal random variables (RVs) is a long–standing open issue, in the old and recent literature, and many approaches have been proposed to deal w...
Marco Di Renzo, Fabio Graziosi, Fortunato Santucci
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 3 months ago
Analyses and Fundamental ideas for a Relation Extraction Approach
Relation extraction is a difficult open research problem with important applications in several fields such as knowledge management, web mining, ontology building, intelligent sys...
Lobna Karoui, Marie-Aude Aufaure, Nacéra Be...
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
14 years 3 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao