Sciweavers

4469 search results - page 153 / 894
» Comparing and Combining Profiles
Sort
View
114
Voted
RAID
2004
Springer
15 years 6 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
AGENTS
2001
Springer
15 years 5 months ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
83
Voted
ISCA
2000
IEEE
91views Hardware» more  ISCA 2000»
15 years 5 months ago
Performance analysis of the Alpha 21264-based Compaq ES40 system
This paper evaluates performance characteristics of the Compaq ES40 shared memory multiprocessor. The ES40 system contains up to four Alpha 21264 CPU’s together with a high-perf...
Zarka Cvetanovic, Richard E. Kessler
CONEXT
2007
ACM
15 years 5 months ago
Do you know what you are generating?
Software-based traffic generators are commonly used in experimental research on computer networks. However, there are no much studies focusing on how such instruments are accurate...
Alberto Dainotti, Alessio Botta, Antonio Pescap&eg...
119
Voted
EVOW
2006
Springer
15 years 4 months ago
Mining Structural Databases: An Evolutionary Multi-Objetive Conceptual Clustering Methodology
Abstract. The increased availability of biological databases containing representations of complex objects permits access to vast amounts of data. In spite of the recent renewed in...
Rocío Romero-Záliz, Cristina Rubio-E...