Sciweavers

1804 search results - page 165 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
163
Voted
KES
2007
Springer
15 years 4 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
CIC
2006
148views Communications» more  CIC 2006»
15 years 5 months ago
RPC LSP Detection and Fuzzy Control Mechanisms in ATM Based MPLS on BcN
A major goal of the BcN (Broadband Convergence Network) is to facilitate convergence of networks and services. Many transport-related technologies were considered. One technology ...
Chulsoo Kim, Semyung Park, Taewan Kim, Jungtae Lee
CLEF
2010
Springer
15 years 5 months ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
ACST
2006
15 years 5 months ago
PDC: Pattern discovery with confidence in DNA sequences
Pattern discovery in DNA sequences is one of the most challenging tasks in molecular biology and computer science. The main goal of pattern discovery in DNA sequences is to identi...
Yi Lu, Shiyong Lu, Farshad Fotouhi, Yan Sun, Zijia...
ICDM
2009
IEEE
259views Data Mining» more  ICDM 2009»
15 years 2 months ago
Topic Modeling for Sequences of Temporal Activities
: Topic Modeling for Sequences of Temporal Activities Zhi-Yong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-Dong Shen HP Laboratories HPL-2010-160 topic modeling, LDA, sequence, temp...
Zhiyong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-...