Sciweavers

1173 search results - page 149 / 235
» Identifying Successful Telecommuters
Sort
View
ACSC
2007
IEEE
15 years 9 months ago
Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides
We present an unsupervised blood cell segmentation algorithm for images taken from peripheral blood smear slides. Unlike prior algorithms the method is fast; fully automated; find...
Nicola Ritter, James R. Cooper
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 9 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
DSRT
2009
IEEE
15 years 9 months ago
Statemachine Matching in BOM Based Model Composition
Base Object Model (BOM) is a component-based standard designed to support reusability and Composability. Reusability helps in reducing time and cost of the development of a simula...
Imran Mahmood, Rassul Ayani, Vladimir Vlassov, Far...
AI
2006
Springer
15 years 9 months ago
Adaptive Fraud Detection Using Benford's Law
Abstract. Adaptive Benford's Law [1] is a digital analysis technique that specifies the probabilistic distribution of digits for many commonly occurring phenomena, even for in...
Fletcher Lu, J. Efrim Boritz, H. Dominic Covvey
158
Voted
APNOMS
2006
Springer
15 years 9 months ago
End-to-End QoS Monitoring Tool Development and Performance Analysis for NGN
This paper intends to introduce the development of a terminal agent for QoS measurement that is suitable for an NGN environment, and to summarize the results of its performance tes...
ChinChol Kim, SangChul Shin, Sang Yong Ha, SunYoun...