Sciweavers

2747 search results - page 201 / 550
» Network externalities in software systems
Sort
View
148
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
DEXAW
2005
IEEE
199views Database» more  DEXAW 2005»
15 years 9 months ago
Combining Multi-Agent-System Methodologies for Organic Computing Systems
As the complexity of computing systems steadily increases, self-managing systems – as Autonomic Computing Systems (ACS) proposed by IBM – are an adequate approach to minimize ...
Holger Kasinger, Bernhard Bauer
114
Voted
COLING
1996
15 years 4 months ago
Communication in large distributed AI Systems for Natural Language Processing
We. are going to describe the design and implementatior, of a connnuniealion system l.or large AI projects, capable of supporting various software components in a heterogeneous ha...
Jan W. Amtrup, Jörg Benra
136
Voted
ARCS
2005
Springer
15 years 9 months ago
Organic Architectures for Large-Scale Environment-Aware Sensor Networks
This paper examines how methods inspired by biological processes can be applied to the design of large-scale environment-aware sensor networks. Our ultimate goal are systems conta...
Paul Lukowicz, Erhardt Barth, Jan T. Kim
107
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Melisa - A Distributed Multimedia System for Multi-Platform Interactive Sports Content Broadcasting
The new generation of television viewers is currently being confronted and becoming acquainted with a series of technological developments in the realm of consumer electronics and...
Emmanuel Papaioannou, Vasilis Karagianis, Kostas K...