Sciweavers

13043 search results - page 2496 / 2609
» Simulation of the research process
Sort
View
INTERNET
2008
150views more  INTERNET 2008»
13 years 9 months ago
Convenience Over Correctness
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Steve Vinoski
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 9 months ago
AMIEDoT: An annotation model for document tracking and recommendation service
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on inf...
Charles A. Robert
CORR
2007
Springer
151views Education» more  CORR 2007»
13 years 9 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
JCST
2008
121views more  JCST 2008»
13 years 9 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
« Prev « First page 2496 / 2609 Last » Next »