Sciweavers

716 search results - page 110 / 144
» Rule Formats for Timed Processes
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICASSP
2008
IEEE
14 years 2 months ago
Cramer-Rao lower bound on doppler frequency of coherent pulse trains
This paper derives the Cramer-Rao lower bound (CRLB) on estimates of the frequency of a coherent pulse-train passively intercepted at a moving antenna. Such estimates are used to ...
J. Andrew Johnson, Mark L. Fowler
CLUSTER
2005
IEEE
14 years 1 months ago
A pipelined data-parallel algorithm for ILP
The amount of data collected and stored in databases is growing considerably for almost all areas of human activity. Processing this amount of data is very expensive, both humanly...
Nuno A. Fonseca, Fernando M. A. Silva, Víto...
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
IV
2002
IEEE
124views Visualization» more  IV 2002»
14 years 16 days ago
Numerical Solving of Geometric Constraints
: In computer-aided design, geometric modeling by constraints enables users to describe shapes by relationships called constraints between geometric elements. The problem is to der...
Samy Ait-Aoudia