Sciweavers

10568 search results - page 1995 / 2114
» Computer Intelligence and Formalization
Sort
View
ICARIS
2005
Springer
15 years 8 months ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof
IDEAL
2005
Springer
15 years 8 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
IDEAL
2005
Springer
15 years 8 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
ISMIR
2005
Springer
155views Music» more  ISMIR 2005»
15 years 8 months ago
MATCH: A Music Alignment Tool Chest
We present MATCH, a toolkit for aligning audio recordings of different renditions of the same piece of music, based on an efficient implementation of a dynamic time warping algor...
Simon Dixon, Gerhard Widmer
ISMIS
2005
Springer
15 years 8 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
« Prev « First page 1995 / 2114 Last » Next »