Sciweavers

5777 search results - page 1118 / 1156
» The palladio component model
Sort
View
CCS
2007
ACM
14 years 2 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CONTEXT
2007
Springer
14 years 2 months ago
Discovering Hidden Contextual Factors for Implicit Feedback
Abstract. This paper presents a statistical framework based on Principal Component Analysis (PCA) for discovering the contextual factors which most strongly influence user behavio...
Massimo Melucci, Ryen W. White
DIS
2007
Springer
14 years 2 months ago
A Hilbert Space Embedding for Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a reprodu...
Alexander J. Smola, Arthur Gretton, Le Song, Bernh...
EEMMAS
2007
Springer
14 years 2 months ago
Engineering Systems Which Generate Emergent Functionalities
Complexity of near future and even nowadays applications is exponentially increasing. In order to tackle the design of such complex systems, being able to engineer self-organising ...
Marie Pierre Gleizes, Valérie Camps, Jean-P...
EMSOFT
2007
Springer
14 years 2 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
« Prev « First page 1118 / 1156 Last » Next »