Sciweavers

7080 search results - page 1295 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
ICCCN
2007
IEEE
15 years 9 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICA
2007
Springer
15 years 9 months ago
Blind Instantaneous Noisy Mixture Separation with Best Interference-Plus-Noise Rejection
Abstract. In this paper, a variant of the well known algorithm FastICA is proposed to be used for blind source separation in off-line (block processing) setup and a noisy environm...
Zbynek Koldovský, Petr Tichavský
CCGRID
2006
IEEE
15 years 9 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
COMSWARE
2006
IEEE
15 years 9 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
HICSS
2006
IEEE
119views Biometrics» more  HICSS 2006»
15 years 9 months ago
Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Todd Shimoda, Linda Stapel
« Prev « First page 1295 / 1416 Last » Next »