Sciweavers

21319 search results - page 4051 / 4264
» An Approach for Method Reengineering
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 4 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
IJRR
2006
126views more  IJRR 2006»
15 years 4 months ago
Market-based Multirobot Coordination for Complex Tasks
Current technological developments and application-driven demands are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missio...
Robert Zlot, Anthony Stentz
JCB
2008
94views more  JCB 2008»
15 years 4 months ago
Prioritize and Select SNPs for Association Studies with Multi-Stage Designs
Large-scale whole genome association studies are increasingly common, due in large part to recent advances in genotyping technology. With this change in paradigm for genetic studi...
Jing Li
CORR
2007
Springer
112views Education» more  CORR 2007»
15 years 4 months ago
Survivable MPLS Over Optical Transport Networks: Cost and Resource Usage Analysis
— In this paper we study different options for the survivability implementation in MPLS over Optical Transport Networks (OTN) in terms of network resource usage and configuratio...
Wojtek Bigos, Bernard Cousin, Stéphane Goss...
JMLR
2008
73views more  JMLR 2008»
15 years 4 months ago
On the Suitable Domain for SVM Training in Image Coding
Conventional SVM-based image coding methods are founded on independently restricting the distortion in every image coefficient at some particular image representation. Geometrical...
Gustavo Camps-Valls, Juan Gutierrez, Gabriel G&oac...
« Prev « First page 4051 / 4264 Last » Next »