Sciweavers

1115 search results - page 54 / 223
» On classification with missing data using rough-neuro-fuzzy ...
Sort
View
IRI
2005
IEEE
14 years 2 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
IJCIM
2007
82views more  IJCIM 2007»
13 years 9 months ago
Towards a classification framework for interoperability of enterprise applications
: Software applications interoperability is a challenge for modern enterprises. It needs establishing standards and protocols for data exchange between different enterprise systems...
Hervé Panetto
ISMAR
2005
IEEE
14 years 2 months ago
Encoded LED System for Optical Trackers
Since introducing a hybrid vision-inertial tracker using passive fiducial markers, we have encountered several applications in which the use of encoded LEDs would be preferable to...
Leonid Naimark, Eric Foxlin
JIIS
2002
118views more  JIIS 2002»
13 years 8 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
VIZSEC
2007
Springer
14 years 3 months ago
Visual Analysis of Network Flow Data with Timelines and Event Plots
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...