Search
Now showing items 1-5 of 5
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)
Abstract:
In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
Synthesis of optical filters using microring resonators with ultra-large FSR
(12/06/2010)
We propose a novel synthesis method for designing flexible, tunable non-periodic filters. It is based on a building block which is presented by first time for these purposes, being the poles position tuned by means of a ...
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)
SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ...
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)
This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ...