Sciweavers

571 search results - page 94 / 115
» A principled approach to operating system construction in Ha...
Sort
View
ISICA
2009
Springer
15 years 7 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
WSC
2000
15 years 2 months ago
Using agent-based modeling to capture airpower strategic effects
Airpower's strength lies in quickly striking the enemy directly where they are vulnerable while being unhampered by geography and surface forces. Airpower theory suggests the...
Richard K. Bullock, Gregory A. McIntyre, Raymond R...
CVIU
2008
203views more  CVIU 2008»
15 years 1 months ago
A computer vision model for visual-object-based attention and eye movements
This paper presents a new computational framework for modelling visual-object based attention and attention-driven eye movements within an integrated system in a biologically insp...
Yaoru Sun, Robert B. Fisher, Fang Wang, Herman Mar...
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 5 months ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 7 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King