Sciweavers

5934 search results - page 183 / 1187
» Detecting a Network Failure
Sort
View
ECCV
2006
Springer
16 years 6 months ago
Object Detection by Contour Segment Networks
We propose a method for object detection in cluttered real images, given a single hand-drawn example as model. The image edges are partitioned into contour segments and organized i...
Vittorio Ferrari, Tinne Tuytelaars, Luc J. Van Goo...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 5 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
15 years 3 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
SIGSOFT
2008
ACM
16 years 5 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
LADC
2005
Springer
15 years 10 months ago
Timed Asynchronous Distributed Systems
We present a framework for building fail-safe hard real-time applications in timed asynchronous distributed systems subject to communication partitions and performance, omission, ...
Christof Fetzer