Sciweavers

4761 search results - page 876 / 953
» Components, Frameworks, Patterns
Sort
View
127
Voted
CCS
2007
ACM
15 years 9 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
170
Voted
MIDDLEWARE
2007
Springer
15 years 8 months ago
Augmenting reflective middleware with an aspect orientation support layer
Reflective middleware provides an effective way to support adaptation in distributed systems. However, as distributed systems become increasingly complex, certain drawbacks of the...
Bholanathsingh Surajbali, Geoff Coulson, Phil Gree...
115
Voted
SCIA
2007
Springer
182views Image Analysis» more  SCIA 2007»
15 years 8 months ago
The Statistical Properties of Local Log-Contrast in Natural Images
Abstract. The study of natural image statistics considers the statistical properties of large collections of images from natural scenes, and has applications in image processing, c...
Jussi T. Lindgren, Jarmo Hurri, Aapo Hyvärine...
103
Voted
DSRT
2006
IEEE
15 years 8 months ago
EGRESS: Environment for Generating REalistic Scenarios for Simulations
In MANETs, majority of performance studies are carried out via simulations, where node mobility and radio propagation models play a crucial role. However, popular simulation tools...
K. N. Sridhar, Shuai Hao, Mun Choon Chan, Akkihebb...
123
Voted
IJCNN
2006
IEEE
15 years 8 months ago
Venn-like models of neo-cortex patches
— This work presents a new architecture of artificial neural networks – Venn Networks, which produce localized activations in a 2D map while executing simple cognitive tasks. T...
Fernando Buarque de Lima Neto, Philippe De Wilde