Sciweavers

78 search results - page 7 / 16
» Detecting Redundant Production Rules
Sort
View
RAID
1999
Springer
15 years 2 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
ICCV
2005
IEEE
15 years 11 months ago
Bottom-up/Top-Down Image Parsing by Attribute Graph Grammar
In this paper, we present an attribute graph grammar for image parsing on scenes with man-made objects, such as buildings, hallways, kitchens, and living rooms. We choose one clas...
Feng Han, Song Chun Zhu
CHES
2004
Springer
170views Cryptology» more  CHES 2004»
15 years 3 months ago
Concurrent Error Detection Schemes for Involution Ciphers
Because of the rapidly shrinking dimensions in VLSI, transient and permanent faults arise and will continue to occur in the near future in increasing numbers. Since cryptographic c...
Nikhil Joshi, Kaijie Wu, Ramesh Karri
DGO
2009
88views Education» more  DGO 2009»
14 years 11 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
15 years 3 months ago
Delta Changes for OO Software Adaptation: Pervasive or Invasive?
The ability for software products to adapt to future changes is essential. Whether the change, the delta, is prefixed to subclasses or postfixed to super classes, class hierarchie...
Atef Bader, Shangping Ren, Husein Armouti