Sciweavers

3641 search results - page 711 / 729
» On Computability of Pattern Recognition Problems
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
JOT
2007
124views more  JOT 2007»
13 years 9 months ago
Displaying Updated Stock Quotes
This paper describes how to extract stock quote data and display it with a dynamic update (using free, but delayed data streams). As a part of the architecture of the program, we ...
Douglas Lyon
TON
2002
112views more  TON 2002»
13 years 9 months ago
Pricing in multiservice loss networks: static pricing, asymptotic optimality, and demand substitution effects
We consider a communication network with fixed routing that can accommodate multiple service classes, differing in bandwidth requirements, demand pattern, call duration, and routin...
Ioannis Ch. Paschalidis, Yong Liu
PPDP
2010
Springer
13 years 8 months ago
Graph queries through datalog optimizations
This paperdescribes the use of a powerful graph query language for querying programs, and a novel combination of transformations for generating efficient implementations of the q...
K. Tuncay Tekle, Michael Gorbovitski, Yanhong A. L...
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
13 years 8 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal