Sciweavers

776 search results - page 120 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
103
Voted
AIMS
2007
Springer
15 years 8 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings
WWW
2010
ACM
15 years 9 months ago
Sampling community structure
We propose a novel method, based on concepts from expander graphs, to sample communities in networks. We show that our sampling method, unlike previous techniques, produces subgra...
Arun S. Maiya, Tanya Y. Berger-Wolf
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
15 years 5 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
ICDCS
1999
IEEE
15 years 6 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
ICIP
2004
IEEE
16 years 3 months ago
Online face recognition system for videos based on modified probabilistic neural networks
Video retrieval in consumer applications demands high level semantic descriptors such as people's identity. The problem is that in a variety of videos such as home videos, Ho...
Jun Fan, Nevenka Dimitrova, Vasanth Philomin