Buscar
Mostrando ítems 1-6 de 6
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)
Abstract:
In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
Synthesis of optical filters using microring resonators with ultra-large FSR
(12/06/2010)
We propose a novel synthesis method for designing flexible, tunable non-periodic filters. It is based on a building block which is presented by first time for these purposes, being the poles position tuned by means of a ...
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)
SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ...
Outdoor stairway segmentation using vertical vanishing point and directional filter
(10/13/2010)
In this paper we propose to detect the localization and recognition of outdoor stairway. This problem is the most fundamental step in solving the problem of autonomous stair climbing navigation. An autonomous system must ...
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)
This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ...