Sciweavers

835 search results - page 167 / 167
» An algorithmic approach to event summarization
Sort
View
CCS
2010
ACM
13 years 5 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
BMCBI
2006
127views more  BMCBI 2006»
13 years 5 months ago
Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks
Background: To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to c...
Sok June Oh, Je-Gun Joung, Jeong Ho Chang, Byoung-...
ICRA
2010
IEEE
194views Robotics» more  ICRA 2010»
13 years 3 months ago
Through the development of a biomechatronic knee prosthesis for transfemoral amputees: Mechanical design and manufacture, human
— This paper presents the development of a biomechatronic knee prosthesis for transfemoral amputees. This kind of prostheses are considered ‘intelligent’ because they are abl...
Rafael R. Torrealba, Claudia Pérez-D'Arpino...
IFE
2010
161views more  IFE 2010»
13 years 3 months ago
Adaptive estimation and prediction of power and performance in high performance computing
Power consumption has become an increasingly important constraint in high-performancecomputing systems, shifting the focus from peak performance towards improving power efficiency...
Reza Zamani, Ahmad Afsahi
CORR
2010
Springer
122views Education» more  CORR 2010»
12 years 12 months ago
Concavity of Mutual Information Rate for Input-Restricted Finite-State Memoryless Channels at High SNR
We consider a finite-state memoryless channel with i.i.d. channel state and the input Markov process supported on a mixing finite-type constraint. We discuss the asymptotic behavio...
Guangyue Han, Brian H. Marcus