Sciweavers

2131 search results - page 44 / 427
» Immunity for Closed Sets
Sort
View
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 9 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
TEC
2002
89views more  TEC 2002»
14 years 9 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
JAT
2011
64views more  JAT 2011»
14 years 4 months ago
Two remarks on remotality
We prove that there exists a weakly closed and bounded subset E of c0 which is not remotal from 0, and such that co (E) is remotal from 0. This answers a question of M. Mart´ın ...
Michal Kraus
CVPR
2004
IEEE
15 years 11 months ago
Approximation of Canonical Sets and Their Applications to 2D View Simplification
Given a set of patterns and a similarity measure between them, we will present an optimization framework to approximate a small subset, known as a canonical set, whose members clo...
Trip Denton, Jeff Abrahamson, Ali Shokoufandeh
ICCV
2007
IEEE
15 years 11 months ago
Finite-Element Level-Set Curve Particles
Particle filters encode a time-evolving probability density by maintaining a random sample from it. Level sets represent closed curves as zero crossings of functions of two variab...
Tingting Jiang, Carlo Tomasi