Sciweavers

1011 search results - page 104 / 203
» The Object Group Design Pattern
Sort
View
HAIS
2009
Springer
14 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
WCRE
2002
IEEE
14 years 3 months ago
A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph
Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-desi...
Ladan Tahvildari, Kostas Kontogiannis
GBRPR
2009
Springer
13 years 8 months ago
A First Step toward Combinatorial Pyramids in n-D Spaces
Abstract. Combinatorial maps define a general framework which allows to encode any subdivision of an nD orientable quasi-manifold with or without boundaries. Combinatorial pyramids...
Sébastien Fourey, Luc Brun
ISMIS
2005
Springer
14 years 3 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
DAGSTUHL
2007
13 years 11 months ago
Subspace outlier mining in large multimedia databases
Abstract. Increasingly large multimedia databases in life sciences, ecommerce, or monitoring applications cannot be browsed manually, but require automatic knowledge discovery in d...
Ira Assent, Ralph Krieger, Emmanuel Müller, T...