Sciweavers

36 search results - page 3 / 8
» acsc 2005
Sort
View
ACSC
2005
IEEE
13 years 11 months ago
A Simulation Framework for Knowledge Acquisition Evaluation
Knowledge acquisition (KA) plays an important role in building knowledge based systems (KBS). However, evaluating different KA techniques has been difficult because of the costs...
Tri M. Cao, Paul Compton
ACSC
2005
IEEE
13 years 11 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
ACSC
2005
IEEE
13 years 11 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ACSC
2005
IEEE
13 years 11 months ago
Integration of generic program analysis tools into a software development environment
Support for program understanding in development and maintenance tasks can be facilitated by program analysis techniques. Both control-flow and data-flow analysis can support pr...
Erica Glynn, Ian J. Hayes, Anthony MacDonald
ACSC
2005
IEEE
13 years 11 months ago
The Geodesic Self-Organizing Map and Its Error Analysis
The Self-Organizing Map (SOM) is one of the popular Artificial Neural Networks which is a useful in clustering and visualizing complex high dimensional data. Conventional SOMs are...
Yingxin Wu, Masahiro Takatsuka