Sciweavers

776 search results - page 142 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
EOR
2008
111views more  EOR 2008»
14 years 11 months ago
Machine-part cell formation in group technology using a modified ART1 method
Group Technology (GT) is a useful way of increasing the productivity for manufacturing high quality products and improving the flexibility of manufacturing systems. Cell formation...
Miin-Shen Yang, Jenn-Hwai Yang
INFOCOM
2012
IEEE
13 years 2 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
ACSAC
2006
IEEE
15 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
15 years 6 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
15 years 5 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...