Sciweavers

1486 search results - page 142 / 298
» Firewall Rules Analysis
Sort
View
JSAC
2006
172views more  JSAC 2006»
15 years 4 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
TROB
2008
128views more  TROB 2008»
15 years 4 months ago
Convergence-Preserving Switching for Topology-Dependent Decentralized Systems
Abstract-- Stability analysis of decentralized control mechanisms for networked, coordinating systems has generally focused on specific controller implementations, such as nearest ...
Brian Shucker, Todd D. Murphey, John K. Bennett
NN
2002
Springer
15 years 4 months ago
Self-organizing maps with recursive neighborhood adaptation
Self-organizing maps (SOMs) are widely used in several fields of application, from neurobiology to multivariate data analysis. In that context, this paper presents variants of the...
John Aldo Lee, Michel Verleysen
TFS
2008
129views more  TFS 2008»
15 years 2 months ago
A Functional-Link-Based Neurofuzzy Network for Nonlinear System Control
Abstract--This study presents a functional-link-based neurofuzzy network (FLNFN) structure for nonlinear system control. The proposed FLNFN model uses a functional link neural netw...
Cheng-Hung Chen, Cheng-Jian Lin, Chin-Teng Lin
PVLDB
2010
107views more  PVLDB 2010»
15 years 2 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...