Sciweavers

1397 search results - page 232 / 280
» On the Need for Practical Formal Methods
Sort
View
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 9 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
SAC
2009
ACM
15 years 8 months ago
Management of requirements in ERP development: a comparison between proprietary and open source ERP
Identification and specification of business requirements are extremely important when development of Enterprise Resource Planning systems (ERPs) take place. It can be stated that...
Björn Johansson, Rogério Atem de Carva...
CP
2000
Springer
15 years 8 months ago
Extending Forward Checking
Abstract. Among backtracking based algorithms for constraint satisfaction problems (CSPs), algorithms employing constraint propagation, like forward checking (FC) and MAC, have had...
Fahiem Bacchus
DASFAA
2010
IEEE
425views Database» more  DASFAA 2010»
15 years 8 months ago
FlexTable: Using a Dynamic Relation Model to Store RDF Data
Efficient management of RDF data is an important factor in realizing the Semantic Web vision. The existing approaches store RDF data based on triples instead of a relation model. I...
Yan Wang, Xiaoyong Du, Jiaheng Lu, Xiaofang Wang
126
Voted
ICNP
1998
IEEE
15 years 8 months ago
Distributed Packet Rewriting and its Application to Scalable Server Architectures
To construct high performance Web servers, system builders are increasingly turning to distributed designs. An important challenge that arises in such designs is the need to direc...
Azer Bestavros, Mark Crovella, Jun Liu, David Mart...