Sciweavers

374 search results - page 54 / 75
» Rights Protection for Relational Data
Sort
View
ESWA
2007
105views more  ESWA 2007»
13 years 8 months ago
Applying rough sets to prevent customer complaints for IC packaging foundry
Packaging is classified as one of back-end processes in the integrated circuits (ICs) manufacturing, highly capital-intensive and involves complex processes. Unlike the front-end...
Hsu-Hao Yang, Tzu-Chiang Liu, Yen-Ting Lin
NN
2007
Springer
267views Neural Networks» more  NN 2007»
13 years 8 months ago
Modeling of gene regulatory networks with hybrid differential evolution and particle swarm optimization
In the last decade, recurrent neural networks (RNNs) have attracted more efforts in inferring genetic regulatory networks (GRNs), using time series gene expression data from micro...
Rui Xu, Ganesh K. Venayagamoorthy, Donald C. Wunsc...
IPPS
2007
IEEE
14 years 2 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
STORAGESS
2005
ACM
14 years 2 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
SAC
2009
ACM
14 years 1 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell