Sciweavers

134 search results - page 13 / 27
» A Hybrid Approach for Accurate Application Traffic Identific...
Sort
View
153
Voted
ISICA
2009
Springer
15 years 4 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
CIBCB
2009
IEEE
14 years 10 months ago
An application of the metric access methods to the mass spectrometry data
Mass spectrometry is a very popular method for protein and peptide identification nowadays. Abundance of data generated in this way grows exponentially every year and although ther...
Jiri Novák, David Hoksza
GIS
2005
ACM
15 years 10 months ago
Close pair queries in moving object databases
Databases of moving objects are important for air traffic control, ground traffic, and battlefield configurations. We introduce the (historical and spatial) range close-pair query...
Panfeng Zhou, Donghui Zhang, Betty Salzberg, Gene ...
ISMAR
2006
IEEE
15 years 3 months ago
Hybrid tracking algorithms for planar and non-planar structures subject to illumination changes
Augmented Reality (AR) aims to fuse a virtual world and a real one in an image stream. When considering only a vision sensor, it relies on registration techniques that have to be ...
Muriel Pressigout, Éric Marchand
105
Voted
CIKM
2006
Springer
15 years 1 months ago
Coupling feature selection and machine learning methods for navigational query identification
It is important yet hard to identify navigational queries in Web search due to a lack of sufficient information in Web queries, which are typically very short. In this paper we st...
Yumao Lu, Fuchun Peng, Xin Li, Nawaaz Ahmed