Sciweavers

3785 search results - page 158 / 757
» Immune System Based Intrusion Detection System
Sort
View
IPPS
2007
IEEE
15 years 11 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
INFOVIS
2005
IEEE
15 years 10 months ago
Visual Correlation for Situational Awareness
We present a novel visual correlation paradigm for situational awareness (SA) and suggest its usage in a diverse set of applications that require a high level of SA. Our approach ...
Yarden Livnat, James Agutter, Shaun Moon, Stefano ...
IJON
2006
146views more  IJON 2006»
15 years 4 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
129
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
A Second Order Statistics Based Algorithm for Blind Recognition of OFDM Based Systems
— An opportunistic radio is a radio able to detect the spectrum unused bands, and to adapt its transmission parameters in order to transmit within these free bands. An opportunis...
Abdelaziz Bouzegzi, Pierre Jallon, Philippe Ciblat
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
15 years 11 months ago
Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research Program
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individual’s local context can be utilized to redu...
Sukeshini A. Grandhi, Quentin Jones