Sciweavers

877 search results - page 171 / 176
» Intrusion detection systems as evidence
Sort
View
WAPCV
2007
Springer
15 years 5 months ago
Reinforcement Learning for Decision Making in Sequential Visual Attention
The innovation of this work is the provision of a system that learns visual encodings of attention patterns and that enables sequential attention for object detection in real world...
Lucas Paletta, Gerald Fritz
ECAI
2008
Springer
15 years 1 months ago
Hierarchical explanation of inference in Bayesian networks that represent a population of independent agents
This paper describes a novel method for explaining Bayesian network (BN) inference when the network is modeling a population of conditionally independent agents, each of which is m...
Peter Sutovskú, Gregory F. Cooper
INFOCOM
2009
IEEE
15 years 6 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
SKG
2006
IEEE
15 years 5 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 12 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu