Sciweavers

1523 search results - page 62 / 305
» Detecting and Sketching the Common
Sort
View
ACSAC
2006
IEEE
15 years 1 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
EMO
2006
Springer
110views Optimization» more  EMO 2006»
15 years 1 months ago
Capabilities of EMOA to Detect and Preserve Equivalent Pareto Subsets
Recent works in evolutionary multiobjective optimization suggest to shift the focus from solely evaluating optimization success in the objective space to also taking the decision s...
Günter Rudolph, Boris Naujoks, Mike Preuss
CSREASAM
2006
14 years 11 months ago
Network Intrusion Detection System with Data Mart
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
Richard Wasniowski
ICASSP
2010
IEEE
14 years 10 months ago
Partial clustering using a time-varying frequency model for singing voice detection
We propose a new method to group partials produced by each instrument of a polyphonic audio mixture. This method works for pitched and harmonic instruments and is specially adapte...
Lise Regnier, Geoffroy Peeters
BMCBI
2006
109views more  BMCBI 2006»
14 years 9 months ago
GPNN: Power studies and applications of a neural network method for detecting gene-gene interactions in studies of human disease
Background: The identification and characterization of genes that influence the risk of common, complex multifactorial disease primarily through interactions with other genes and ...
Alison A. Motsinger, Stephen L. Lee, George Mellic...