Sciweavers

839 search results - page 124 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
109
Voted
TKDE
2008
178views more  TKDE 2008»
15 years 20 days ago
Efficient Similarity Search over Future Stream Time Series
With the advance of hardware and communication technologies, stream time series is gaining ever-increasing attention due to its importance in many applications such as financial da...
Xiang Lian, Lei Chen 0002
112
Voted
ANCS
2007
ACM
15 years 4 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
131
Voted
AISADM
2005
Springer
15 years 6 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
15 years 6 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
113
Voted
JVCA
2008
72views more  JVCA 2008»
15 years 22 days ago
Robust deformation capture from temporal range data for surface rendering
Imagine an object such as a paper sheet being waved in front of some sensor. Reconstructing the time-varying 3D shape of the object finds direct applications in computer animation...
Umberto Castellani, Vincent Gay-Bellile, Adrien Ba...