Sciweavers

1413 search results - page 240 / 283
» Design Patterns Application in UML
Sort
View
ETRICS
2006
15 years 8 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 8 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
15 years 8 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad
ANTSW
2008
Springer
15 years 6 months ago
A Simulation Study of Routing Performance in Realistic Urban Scenarios for MANETs
Abstract. We study through simulation the performance of two MANET routing algorithms in a realistic urban environment. The two algorithms, AODV and AntHocNet, are representative o...
Gianni Di Caro, Frederick Ducatelle, Luca Maria Ga...
CIKM
2008
Springer
15 years 6 months ago
Characterizing and predicting community members from evolutionary and heterogeneous networks
Mining different types of communities from web data have attracted a lot of research efforts in recent years. However, none of the existing community mining techniques has taken i...
Qiankun Zhao, Sourav S. Bhowmick, Xin Zheng, Kai Y...