Sciweavers

247 search results - page 44 / 50
» The importance of cognitive architectures: an analysis based...
Sort
View
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
DS
2001
143views Database» more  DS 2001»
13 years 10 months ago
WebSifter: An Ontological Web-Mining Agent for E-Business
: The World Wide Web provides access to a great deal of information on a vast array of subjects. A user can begin a search for information by selecting a Web page and following the...
Anthony Scime, Larry Kerschberg
COMSIS
2007
80views more  COMSIS 2007»
13 years 8 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
JNW
2008
182views more  JNW 2008»
13 years 8 months ago
Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks
Next-Generation Wireless Networks (NGWNs) present an all-IP-based architecture integrating existing cellular networks with Wireless Local Area Networks (WLANs), Wireless Metropolit...
Li Jun Zhang, Samuel Pierre
NAR
2008
122views more  NAR 2008»
13 years 8 months ago
SIMAP - structuring the network of protein similarities
Protein sequences are the most important source of evolutionary and functional information for new proteins. In order to facilitate the computationally intensive tasks of sequence...
Thomas Rattei, Patrick Tischler, Roland Arnold, Fr...