Sciweavers

662 search results - page 102 / 133
» IPSec: Performance Analysis and Enhancements
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IRI
2009
IEEE
15 years 4 months ago
Towards a General Entity Representation Model
In recent years, there is an increasing interest in the Semantic Web and the relevant technologies, which can have a significant impact in the context of information and knowledge...
Barbara Bazzanella, Themis Palpanas, Heiko Stoerme...
CAIP
2009
Springer
252views Image Analysis» more  CAIP 2009»
15 years 4 months ago
Incorporating Shape Features in an Appearance-Based Object Detection System
Most object detection techniques discussed in the literature are based solely on texture-based features that capture the global or local appearance of an object. While results indi...
Gurman Gill, Martin Levine
DILS
2009
Springer
15 years 4 months ago
Integration of Full-Coverage Probabilistic Functional Networks with Relevance to Specific Biological Processes
Probabilistic functional integrated networks are powerful tools with which to draw inferences from high-throughput data. However, network analyses are generally not tailored to spe...
Katherine James, Anil Wipat, Jennifer Hallinan
SARA
2009
Springer
15 years 4 months ago
Common Subexpressions in Constraint Models of Planning Problems
Constraint Programming is an attractive approach for solving AI planning problems by modelling them as Constraint Satisfaction Problems (CSPs). However, formulating effective cons...
Andrea Rendl, Ian Miguel, Ian P. Gent, Peter Grego...