Sciweavers

890 search results - page 147 / 178
» software 1998
Sort
View
ACSAC
1998
IEEE
13 years 11 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
CLEF
2005
Springer
14 years 1 months ago
Dictionary-Based Amharic-French Information Retrieval
We present four approaches to the Amharic - French bilingual track at CLEF 2005. All experiments use a dictionary based approach to translate the Amharic queries into French Bags-...
Atelach Alemu Argaw, Lars Asker, Rickard Cöst...
VLDB
1998
ACM
101views Database» more  VLDB 1998»
13 years 11 months ago
On Optimal Node Splitting for R-trees
The problem of finding an optimal bipartition of a rectangle set has a direct impact on query performance of dynamic R-trees. During update operations, overflowed nodes need to be...
Yván J. García, Mario A. Lopez, Scot...
BROADBAND
1998
13 years 9 months ago
Multipath FEC scheme for the ATM adaptation layer AAL5
One approach to facilitate statistical multiplexing of bursty sources in ATM networks is dispersion of the traffic over independent paths. It has been shown within the literature ...
Georg Carle, Stefan Dresler, Jochen H. Schiller
IPCC
1998
92views more  IPCC 1998»
13 years 9 months ago
Evaluating Distance Learning in Graduate Programs: Ensuring Rigorous, Rewarding Professional Education
: Internet-based distance learning programs make it possible for technical communicators located anywhere in the world to participate in graduate courses in their field. But are th...
George F. Hayhoe