نتایج جستجو برای: alert line
تعداد نتایج: 424163 فیلتر نتایج به سال:
Near-real time altimetry products from ENVISAT RA2, Jason 1 and Topex/Poseidon tandem mission are validated for the North Sea and Baltic Sea region to assess the feasibility of using the data for operational purposes. The coverage of the satellite data shows that all Jason 1 and Topex/Poseidon observations in the Baltic Sea are currently discarded in the processing of the data. The spatial scal...
This paper presents the results of the project MIAU, a data mining approach for intrusion detection alert correlation. MIAU combines different data mining techniques in order to properly solve some existing problems in the management and analysis of alerts generated by actual intrusion detection systems. Some of these data mining methods and their application to MIAU are introduced in this pape...
In 1977 Hartwig and Luh asked whether an element a in a Dedekind-finite ring R satisfying aR = a2R also satisfies Ra = Ra2. In this paper, we answer this question in the negative. We also prove that if a is an element of a Dedekind-finite exchange ring R and aR = a2R, then Ra = Ra2. This gives an easier proof of Dischinger’s theorem that left strongly π-regular rings are right strongly π-regula...
Perhaps the last major effort to save the world’s great apes from extinction has been launched at a recent meeting held in the Democratic Republic of the Congo, one of 23 home states of the great apes. The meeting included an unusually broad range of interests for a conservation issue, with businesses, industry and communities joining up with scientists, environmental agencies and UN bodies to ...
Treatment techniques and tools to address alcohol use disorders (AUDs)* have multiplied over the last 30 years, moving beyond models based on Alcoholics Anonymous and its offshoot, the Minnesota Model. Care providers now can prescribe medications to aid people as they work to reduce their drinking. If a traditional mutualhelp group model of care does not appeal to a patient, he or she has other...
In distributed agent architecture, tasks are performed on multiple computers which are sometimes spread across different locations. While it is important to collect security critical sensory information from the agent society, it is equally important to analyze and report such security events in a precise and useful manner. Data mining techniques are found to be very efficient in the generation...
The current intrusion detection systems (IDSs) generate a tremendous number of intrusion alerts. In practice, managing and analyzing this large number of low-level alerts is one of the most challenging tasks for a system administrator. In this context alert correlation techniques aiming to provide a succinct and high-level view of attacks gained a lot of interest. Although, a variety of methods...
We present a prototype that integrates WAP-based information access with spoken dialog interaction. WAP phone usability is encumbered by keypad entry for typing text, and also by the small screen-size that requires much scrolling during browsing or menu selection. The spoken dialog interface offers a desirable complement whereby commands may be spoken instead of typed, and the dialog design may...
BACKGROUND Electronic Health Record (EHR)-based sepsis alert systems have failed to demonstrate improvements in clinically meaningful endpoints. However, the effect of implementation barriers on the success of new sepsis alert systems is rarely explored. OBJECTIVE To test the hypothesis time to severe sepsis alert acknowledgement by critical care clinicians in the ICU setting would be reduced...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید