Sciweavers

3785 search results - page 690 / 757
» Immune System Based Intrusion Detection System
Sort
View
ICSE
2008
IEEE-ACM
16 years 20 days ago
Analyzing medical processes
This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
WWW
2007
ACM
16 years 16 days ago
Sliding window technique for the web log analysis
The results of the Web query log analysis may be significantly shifted depending on the fraction of agents (non-human clients), which are not excluded from the log. To detect and ...
Nikolai Buzikashvili
ICCS
2009
Springer
15 years 6 months ago
Spatial Relations Analysis by Using Fuzzy Operators
Spatial relations play important role in computer vision, scene analysis, geographic information systems (GIS) and content based image retrieval. Analyzing spatial relations by Fo...
Nadeem Salamat, El-hadi Zahzah
68
Voted
BROADNETS
2007
IEEE
15 years 6 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
CRV
2007
IEEE
127views Robotics» more  CRV 2007»
15 years 6 months ago
Extrinsic Recalibration in Camera Networks
This work addresses the practical problem of keeping a camera network calibrated during a recording session. When dealing with real-time applications, a robust calibration of the ...
Chris Hermans, Maarten Dumont, Philippe Bekaert