Sciweavers

2292 search results - page 384 / 459
» Techniques and tools for dynamic optimization
Sort
View
AAAI
2008
13 years 10 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
EDBT
2010
ACM
185views Database» more  EDBT 2010»
13 years 10 months ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy
EON
2003
13 years 9 months ago
OntoTrack: Fast Browsing and Easy Editing of Large Ontologie
Abstract. OntoTrack is a new browsing and editing “in-one-view” ontology authoring tool. It combines a sophisticated graphical layout with mouse enabled editing features optimi...
Thorsten Liebig, Olaf Noppens
3DICA
2000
13 years 9 months ago
Automatic Reconstruction of Large 3D Models of Real Environments from Unregistered Data-sets
Towards photo-realistic 3D scene reconstruction from range and color images, we present a statistical technique for multimodal image registration. Statistical tools are employed t...
Faysal Boughorbel, David L. Page, Mongi A. Abidi
LISA
1998
13 years 9 months ago
A Visual Approach for Monitoring Logs
Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most ...
Luc Girardin, Dominique Brodbeck