Sciweavers

861 search results - page 125 / 173
» Towards feature selection in network
Sort
View
TELSYS
2002
70views more  TELSYS 2002»
13 years 10 months ago
Integrating Differentiated Services with ATM
IP in the edge and ATM in the core are commonplace in today's internetworks. The IETF has proposed a new Quality of Service (QoS) mechanism namely Differentiated Services (Dif...
Sowmya Manjanatha, Radim Bartos
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 5 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
IJCSA
2007
99views more  IJCSA 2007»
13 years 11 months ago
Wing Pattern-Based Classification of the Rhagoletis pomonella Species Complex Using Genetic Neural Networks
The Rhagoletis pomonella species complex consists of at least four sibling species. They are highly host specific as larvae, and display great fidelity as adults. The only certain...
Chengpeng Bi, Michael C. Saunders, Bruce A. McPher...
ITCC
2002
IEEE
14 years 4 months ago
Design and Generation of Adaptable Web Information Systems with KIWIS
Web-based Information Systems (WIS) are now widely used for diffusing and processing information over the network. Methodological guidelines which assist WIS developers in their t...
Marlène Villanova-Oliver, Jérô...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 11 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh