Sciweavers

869 search results - page 159 / 174
» An Effective Learning Method for Max-Min Neural Networks
Sort
View
NDSS
2003
IEEE
15 years 5 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
GFKL
2007
Springer
202views Data Mining» more  GFKL 2007»
15 years 3 months ago
Collective Classification for Labeling of Places and Objects in 2D and 3D Range Data
In this paper, we present an algorithm to identify types of places and objects from 2D and 3D laser range data obtained in indoor environments. Our approach is a combination of a c...
Rudolph Triebel, Óscar Martínez Mozo...
SRDS
2010
IEEE
14 years 9 months ago
Invariants Based Failure Diagnosis in Distributed Computing Systems
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our meth...
Haifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhil...
BMCBI
2007
168views more  BMCBI 2007»
14 years 11 months ago
Benchmarking consensus model quality assessment for protein fold recognition
Background: Selecting the highest quality 3D model of a protein structure from a number of alternatives remains an important challenge in the field of structural bioinformatics. M...
Liam J. McGuffin
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 11 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh