Sciweavers

1397 search results - page 232 / 280
» On the Need for Practical Formal Methods
Sort
View
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 15 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
SAC
2009
ACM
14 years 11 days ago
Management of requirements in ERP development: a comparison between proprietary and open source ERP
Identification and specification of business requirements are extremely important when development of Enterprise Resource Planning systems (ERPs) take place. It can be stated that...
Björn Johansson, Rogério Atem de Carva...
CP
2000
Springer
14 years 2 days ago
Extending Forward Checking
Abstract. Among backtracking based algorithms for constraint satisfaction problems (CSPs), algorithms employing constraint propagation, like forward checking (FC) and MAC, have had...
Fahiem Bacchus
DASFAA
2010
IEEE
425views Database» more  DASFAA 2010»
14 years 1 days ago
FlexTable: Using a Dynamic Relation Model to Store RDF Data
Efficient management of RDF data is an important factor in realizing the Semantic Web vision. The existing approaches store RDF data based on triples instead of a relation model. I...
Yan Wang, Xiaoyong Du, Jiaheng Lu, Xiaofang Wang
ICNP
1998
IEEE
13 years 12 months ago
Distributed Packet Rewriting and its Application to Scalable Server Architectures
To construct high performance Web servers, system builders are increasingly turning to distributed designs. An important challenge that arises in such designs is the need to direc...
Azer Bestavros, Mark Crovella, Jun Liu, David Mart...