Sciweavers

3785 search results - page 741 / 757
» Immune System Based Intrusion Detection System
Sort
View
SSDBM
2005
IEEE
159views Database» more  SSDBM 2005»
15 years 5 months ago
Clustering Moving Objects via Medoid Clusterings
Modern geographic information systems do not only have to handle static information but also dynamically moving objects. Clustering algorithms for these moving objects provide new...
Hans-Peter Kriegel, Martin Pfeifle
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
PCM
2004
Springer
124views Multimedia» more  PCM 2004»
15 years 5 months ago
Audio-Assisted Video Browsing for DVD Recorders
We present an audio-assisted video browsing system for a Hard Disk Drive (HDD) enhanced DVD recorder. We focus on our sports highlights extraction based on audio classification. ...
Ajay Divakaran, Isao Otsuka, Regunathan Radhakrish...
ICNP
2003
IEEE
15 years 5 months ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
ICNP
2000
IEEE
15 years 4 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang