Sciweavers

1010 search results - page 80 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
TSMC
2008
172views more  TSMC 2008»
14 years 11 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ECCV
2006
Springer
15 years 1 months ago
Robust Face Alignment Based on Hierarchical Classifier Network
Abstract. Robust face alignment is crucial for many face processing applications. As face detection only gives a rough estimation of face region, one important problem is how to al...
Li Zhang, Haizhou Ai, Shihong Lao
ISMB
2003
15 years 1 months ago
Deriving phylogenetic trees from the similarity analysis of metabolic pathways
Comparative analysis of metabolic pathways in different genomes can give insights into the understanding of evolutionary and organizational relationships among species. This type ...
Maureen Heymans, Ambuj K. Singh
EWSN
2008
Springer
15 years 11 months ago
Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
X. Rosalind Wang, Joseph T. Lizier, Oliver Obst, M...
CHI
2010
ACM
15 years 6 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...