Sciweavers

2474 search results - page 407 / 495
» Using Knowledge Management Systems to Structure Knowledgeabl...
Sort
View
IWIA
2006
IEEE
14 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
WWW
2005
ACM
14 years 2 months ago
Hera presentation generator
Semantic Web Information Systems (SWIS) are Web Information Systems that use Semantic Web technologies. Hera is a modeldriven design methodology for SWIS. In Hera, models are repr...
Flavius Frasincar, Geert-Jan Houben, Peter Barna
CISS
2007
IEEE
14 years 1 months ago
How Many Users should be Turned On in a Multi-Antenna Broadcast Channel
This paper considers broadcast channels with L antennas at the base station and m single-antenna users, where each user has perfect channel knowledge and the base station obtains c...
Wei Dai, Youjian Liu, Brian Rider
DEBS
2008
ACM
13 years 11 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 7 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza