Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Jim N. Treadwell"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642396397
ICCSA (5)
ICCSA (5)
In spite of social media’s lack of structural integrity, accuracy, and reduced noise with respect to other forms of communication, it plays an increasingly vital role in the observation of societal actions before, during, and after significant even
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79d342099bf791161711d0084353961f
https://doi.org/10.1007/978-3-642-39640-3_36
https://doi.org/10.1007/978-3-642-39640-3_36
A final report on an ORNL task to establish a knowledge discovery and management tool to retrieve and recommend information from existing S&T documents for the Office of Naval Research Global.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f939a74656937b161b7e7361b8d1dfaf
https://doi.org/10.2172/1042913
https://doi.org/10.2172/1042913
Publikováno v:
Computational Science and Its Applications – ICCSA 2012 ISBN: 9783642311277
ICCSA (4)
ICCSA (4)
The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b5eaa49ffe8106419902c05a2efa1771
https://doi.org/10.1007/978-3-642-31128-4_48
https://doi.org/10.1007/978-3-642-31128-4_48
Publikováno v:
HICSS
Creating incentives for knowledge workers to share their knowledge within an organization continues to be a challenging task. Strong, innate behaviors of the knowledge worker, such as self-preservation and self-advancement, are difficult to overcome,
Publikováno v:
IWCMC
Most commercial intrusion detections systems (IDS) can produce a very high volume of alerts, and are typically plagued by a high false positive rate. The approach described here uses Splunk to aggregate IDS alerts. The aggregated IDS alerts are retri
Autor:
Everett Stiles, Laura L. Pullum, Jim N. Treadwell, Justin M. Beaver, Xiaohui Cui, Thomas E. Potok, Brian Klump
Publikováno v:
SocialCom/PASSAT
Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to patterns and behaviors exhibited in those animal colonies. In this re
Publikováno v:
GECCO (Companion)
An abdominal aortic aneurysm is a problem in which the wall of the artery that supplies blood to the abdomen and lower extremities expands under pressure or balloons outward. Patients must undergo surgery to repair such an aneurysm, and there is curr
Publikováno v:
GECCO (Companion)
Radiologists disagree with each other over the characteristics and features of what constitutes a normal mammogram and the terminology to use in the associated radiology report. Recently, the focus has been on classifying abnormal or suspicious repor
Publikováno v:
2009 IEEE Conference on Technologies for Homeland Security.
A significant challenge in the distribution of goods is assessing the potential threat that an individual shipping container poses. Due to the high volume of shipped goods, a primary concern is balancing accuracy and container scan time. The applicat
Publikováno v:
Nature Inspired Cooperative Strategies for Optimization (NICSO 2007) ISBN: 9783540789864
NICSO
NICSO
This report presents a pilot study of an integration of particle swarm algorithm, social knowledge adaptation and multi-agent approaches for modeling the collective search behavior of self-organized groups in an adaptive environment. The objective of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7b4d7f8cb9dacf7fdaa764e98063f9d2
https://doi.org/10.1007/978-3-540-78987-1_20
https://doi.org/10.1007/978-3-540-78987-1_20