Sciweavers

2236 search results - page 100 / 448
» Intrusion detection techniques and approaches
Sort
View
DAC
1999
ACM
15 years 11 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
LCN
2008
IEEE
15 years 4 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
MICCAI
2006
Springer
15 years 11 months ago
A Nonparametric Bayesian Approach to Detecting Spatial Activation Patterns in fMRI Data
Traditional techniques for statistical fMRI analysis are often based on thresholding of individual voxel values or averaging voxel values over a region of interest. In this paper w...
Hal S. Stern, Padhraic Smyth, Seyoung Kim
IAJIT
2011
14 years 5 months ago
A constraint programming based approach to detect ontology inconsistencies
: This paper proposes a constraint programming based approach to handle ontologies consistency, and more precisely user-defined consistencies. In practice, ontologies consistency i...
Moussa Benaissa, Yahia Lebbah
IPPS
2010
IEEE
14 years 8 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...