Sciweavers

4285 search results - page 765 / 857
» Differential Behavioral Analysis
Sort
View
JSAC
2006
165views more  JSAC 2006»
14 years 9 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
PAA
2008
14 years 9 months ago
Human action recognition in videos based on the Transferable Belief Model
Abstract This paper focuses on human behavior recognition where the main problem is to bridge the semantic gap between the analogue observations of the real world and the symbolic ...
Emmanuel Ramasso, Costas Panagiotakis, Denis Pelle...
PE
2006
Springer
114views Optimization» more  PE 2006»
14 years 9 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
SIAMSC
2008
104views more  SIAMSC 2008»
14 years 9 months ago
Reducing Floating Point Error in Dot Product Using the Superblock Family of Algorithms
This paper discusses both the theoretical and statistical errors obtained by various well-known dot products, from the canonical to pairwise algorithms, and introduces a new and mo...
Anthony M. Castaldo, R. Clint Whaley, Anthony T. C...
SIGIR
2008
ACM
14 years 9 months ago
Retrieval and feedback models for blog feed search
Blog feed search poses different and interesting challenges from traditional ad hoc document retrieval. The units of retrieval, the blogs, are collections of documents, the blog p...
Jonathan L. Elsas, Jaime Arguello, Jamie Callan, J...