Sciweavers

1709 search results - page 264 / 342
» networks 2000
Sort
View
DSN
2000
IEEE
14 years 1 months ago
Towards Continuous Availability of Internet Services through Availability Domains
The increasing number of Internet users has caused a dramatic increase in electronic commerce. This growth is outpacing technologies for dependability causing traditional views of...
Nicholas S. Bowen, Daniel C. Sturman, Tina Ting Li...
SIGECOM
2000
ACM
227views ECommerce» more  SIGECOM 2000»
14 years 1 months ago
Combinatorial auctions for supply chain formation
Supply chain formation presents difficult coordination issues for distributed negotiation protocols. Agents must simultaneously negotiate production relationships at multiple lev...
William E. Walsh, Michael P. Wellman, Fredrik Ygge
DSOM
2000
Springer
14 years 1 months ago
Operational Data Analysis: Improved Predictions Using Multi-computer Pattern Detection
Operational Data Analysis (ODA) automatically 1) monitors the performance of a computer through time, 2) stores such information in a data repository, 3) applies data-mining techn...
Ricardo Vilalta, Chidanand Apté, Sholom M. ...
RAID
2000
Springer
14 years 12 days ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
IJCNN
2000
IEEE
14 years 1 months ago
Fuzzy Clustering Algorithm Extracting Principal Components Independent of Subsidiary Variables
Fuzzy c-varieties (FCV) is one of the clustering algorithms in which the prototypes are multi-dimensional linear varieties. The linear varieties are represented by some local prin...
Chi-Hyon Oh, Hirokazu Komatsu, Katsuhiro Honda, Hi...