Sciweavers

1513 search results - page 301 / 303
» Fibonacci Correction Networks
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
TSMC
2008
117views more  TSMC 2008»
14 years 8 months ago
Discovery of High-Level Behavior From Observation of Human Performance in a Strategic Game
This paper explores the issues faced in creating a sys-4 tem that can learn tactical human behavior merely by observing5 a human perform the behavior in a simulation. More specific...
Brian S. Stensrud, Avelino J. Gonzalez
75
Voted
NECO
2010
103views more  NECO 2010»
14 years 8 months ago
Posterior Weighted Reinforcement Learning with State Uncertainty
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
VTC
2010
IEEE
153views Communications» more  VTC 2010»
14 years 7 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
GI
2009
Springer
14 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...