Sciweavers

2847 search results - page 353 / 570
» The Context-Dependent Role Model
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 3 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
IWDC
2004
Springer
14 years 3 months ago
Reliability of VLSI Linear Arrays with Redundant Links
Reliability is one of the most important attributes of any system. Adding redundancy is one way to improve the reliability. In this paper, we consider linear VLSI arrays in which e...
Soumen Maity, Amiya Nayak, Bimal K. Roy
OTM
2004
Springer
14 years 3 months ago
Cases and Dialectical Arguments - An Approach to Case-Based Reasoning
Case-based reasoning in the law is a reasoning strategy in which legal conclusions are supported by decisions made by judges. If the case at hand is analogous to a settled case, th...
Bram Roth, Bart Verheij
SAT
2004
Springer
113views Hardware» more  SAT 2004»
14 years 3 months ago
Clause Form Conversions for Boolean Circuits
The Boolean circuits is well established as a data structure for building propositional encodings of problems in preparation for satisfiability solving. The standard method for co...
Paul Jackson, Daniel Sheridan
CSB
2003
IEEE
110views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Prokaryote Phylogeny without Sequence Alignment: From Avoidance Signature to Composition Distance
A new and essentially simple method to reconstruct prokaryotic phylogenetic trees from their complete genome data without using sequence alignment is proposed. It is based on the ...
Bailin Hao, Ji Qi