Sciweavers

345 search results - page 69 / 69
» Using Active Learning in Intrusion Detection
Sort
View
ASIACRYPT
2009
Springer
13 years 11 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
LANOMS
2007
IEEE
172views Education» more  LANOMS 2007»
13 years 11 months ago
Implementing and Deploying Network Monitoring Service Oriented Architectures
—Recently there is a growing interest in accessing network measurement and status data across multiple domains, in order to detect eventual network problems which can hinder the ...
Leobino Nascimento Sampaio, Ivo Koga, Rafael Costa...
AAAI
2012
11 years 7 months ago
A Novel and Scalable Spatio-Temporal Technique for Ocean Eddy Monitoring
Swirls of ocean currents known as ocean eddies are a crucial component of the ocean’s dynamics. In addition to dominating the ocean’s kinetic energy, eddies play a significan...
James H. Faghmous, Yashu Chamber, Shyam Boriah, Fr...
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
13 years 9 months ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...
EVOW
2006
Springer
13 years 8 months ago
Robust SVM-Based Biomarker Selection with Noisy Mass Spectrometric Proteomic Data
Abstract. Computational analysis of mass spectrometric (MS) proteomic data from sera is of potential relevance for diagnosis, prognosis, choice of therapy, and study of disease act...
Elena Marchiori, Connie R. Jimenez, Mikkel West-Ni...