Sciweavers

540 search results - page 85 / 108
» Comparing distributions and shapes using the kernel distance
Sort
View
RAID
2004
Springer
15 years 2 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
76
Voted
ICPP
1990
IEEE
15 years 1 months ago
Interleaved All-to-All Reliable Broadcast on Meshes and Hypercubes
All-to-all (ATA) reliable broadcast is the problem of reliably distributing information from every node to every other node in point-to-point interconnection networks. A good solut...
Sunggu Lee, Kang G. Shin
SIAMAM
2008
94views more  SIAMAM 2008»
14 years 9 months ago
Diffusion of Protein Receptors on a Cylindrical Dendritic Membrane with Partially Absorbing Traps
Abstract. We present a model of protein receptor trafficking within the membrane of a cylindrical dendrite containing small protrusions called spines. Spines are the locus of most ...
Paul C. Bressloff, Berton A. Earnshaw, Michael J. ...
ICPR
2006
IEEE
15 years 10 months ago
Dissimilarity-based classification for vectorial representations
General dissimilarity-based learning approaches have been proposed for dissimilarity data sets [11, 10]. They arise in problems in which direct comparisons of objects are made, e....
Elzbieta Pekalska, Robert P. W. Duin
WSCG
2004
117views more  WSCG 2004»
14 years 11 months ago
A Supply-Chain for Computer-Mediated Communication and Visualization
The paper specifies modular software for synchronous and asynchronous computer-mediated communication and visualization in network-distributed environments. It is new because the ...
Nils Jensen, Ralf Einhorn, Gabriele von Voigt