Sciweavers

1274 search results - page 191 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
COLING
2010
14 years 4 months ago
Resolving Surface Forms to Wikipedia Topics
Ambiguity of entity mentions and concept references is a challenge to mining text beyond surface-level keywords. We describe an effective method of disambiguating surface forms an...
Yiping Zhou, Lan Nie, Omid Rouhani-Kalleh, Flavian...
TSP
2008
86views more  TSP 2008»
14 years 9 months ago
Fixed-Complexity Soft MIMO Detection via Partial Marginalization
Abstract--This paper presents a new approach to soft demodulation for MIMO channels. The proposed method is an approximation to the exact a posteriori probability-per-bit computer....
Erik G. Larsson, Joakim Jalden
ANCS
2007
ACM
15 years 1 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
KDD
2002
ACM
169views Data Mining» more  KDD 2002»
15 years 10 months ago
A Framework for Customizable Sports Video Management and Retrieval
Several domain specific approaches for sports video management have shown the benefits of integrating low- and high- level video contents in supporting more robust retrieval. Howev...
Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham