Showing 1 - 10 of 79
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granularity, it prevents system administrators from handling the alerts effectively. This in turn degrades the usability of an intrusion detection system. Aside from detection, timely responses of...
Persistent link: https://www.econbiz.de/10009438759
Modern computing environments involve a multitude of components working in concert to provide services to users. Computer elements, network elements, operating systems, applications, users, etc. must to be constantly managed and controlled to prevent unintended or illegal accesses that could...
Persistent link: https://www.econbiz.de/10009438800
The Internet has become the standard infrastructure for all kinds of communications. At the same time, the emergence of cloud computing and web services has significantly strengthened requirements for the Internet to display greater robustness to disruptions and higher flexibility to support...
Persistent link: https://www.econbiz.de/10009438961
Machine learning has become one of the most active and exciting areas of computer science research, in large part because of its wide-spread applicability to problems as diverse as natural language processing, speech recognition, spam detection, search, computer vision, gene discovery, medical...
Persistent link: https://www.econbiz.de/10009439011
Within the information systems field, the task of conceptual modeling involves building a representation of selected phenomena in some domain. High-quality conceptual-modeling work is important because it facilitates early detection and correction of system development errors. It also plays an...
Persistent link: https://www.econbiz.de/10009448069
In an environment where privacy is an increasing concern to users that communicate through a public network, anonymity systems can play a fundamental role in helping safeguard users' identities. The peer-to-peer (P2P) architecture has emerged as a promising paradigm for designing large-scale...
Persistent link: https://www.econbiz.de/10009467766
Many applications require predicting not a just a single variable, but multiple variables that depend on each other. Recent attention has therefore focused on structured prediction methods, which combine the modeling flexibility of graphical models with the ability to employ complex, dependent...
Persistent link: https://www.econbiz.de/10009467786
Local area networks (LANs) provide links between computing devices, such as workstations, file servers, and printers, over a relatively small geographic area (usually within a single building or organization). While computer networks have existed for almost thirty years, networking technology...
Persistent link: https://www.econbiz.de/10009467950
Program dependences are syntactic relationships between program statements, which are used in several areas of computer science to obtain "approximate" information about semantic relationships between statements. There are two basic types of program dependences: control dependences, which are...
Persistent link: https://www.econbiz.de/10009468056
This study examines the design and development of computer-aided composition (CAC) software and its implications for Composition in general. The aims of the study were to identify the who and how of CAC software design and possibly construct models for CAC software development. In addition, the...
Persistent link: https://www.econbiz.de/10009468073