Sciweavers

1305 search results - page 219 / 261
» An Optimization Algorithm Based on Active and Instance-Based...
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 7 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
105
Voted
CODES
2004
IEEE
15 years 4 months ago
CPU scheduling for statistically-assured real-time performance and improved energy efficiency
We present a CPU scheduling algorithm, called Energy-efficient Utility Accrual Algorithm (or EUA), for battery-powered, embedded real-time systems. We consider an embedded softwar...
Haisang Wu, Binoy Ravindran, E. Douglas Jensen, Pe...
EDCC
2008
Springer
15 years 2 months ago
Targeted Distribution of Resource Allocation for Backup LSP Computation
Under the hypothesis of single failures in the network, some backup paths cannot be active at the same time because they protect against the failure of different components. Hence...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
112
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Interference alignment in MIMO cellular networks
We explore the feasibility of linear interference alignment (IA) in MIMO cellular networks. Each base station (BTS) has Nt transmit antennas, each mobile has Nr receive antennas, ...
Binnan Zhuang, Randall A. Berry, Michael L. Honig
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 1 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik