Sciweavers

650 search results - page 82 / 130
» Towards automatic model synchronization from model transform...
Sort
View
CCS
2003
ACM
14 years 2 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
PCI
2005
Springer
14 years 2 months ago
Towards In-Situ Data Storage in Sensor Databases
Abstract. The advances in wireless communications along with the exponential growth of transistors per integrated circuit lead to a rapid evolution of Wireless Sensor Devices (WSDs...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki, Dimi...
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
14 years 2 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
ICCV
2001
IEEE
14 years 11 months ago
A Novel Modeling Algorithm for Shape Recovery of Unknown Topology
This paper presents a novel modeling algorithm that is capable of simultaneously recovering correct shape geometry as well as its unknown topology from arbitrarily complicated dat...
Ye Duan, Hong Qin
JCDL
2010
ACM
184views Education» more  JCDL 2010»
14 years 2 months ago
Evaluating topic models for digital libraries
Topic models could have a huge impact on improving the ways users find and discover content in digital libraries and search interfaces, through their ability to automatically lea...
David Newman, Youn Noh, Edmund M. Talley, Sarvnaz ...