Sciweavers

2236 search results - page 101 / 448
» Intrusion detection techniques and approaches
Sort
View
COMAD
2009
14 years 11 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...
TSMC
1998
117views more  TSMC 1998»
14 years 9 months ago
A mean field annealing approach to robust corner detection
—This paper is an extension of our previous paper to improve the capability of detecting corners. We proposed a method of boundary smoothing for curvature estimation using a cons...
Kwanghoon Sohn, Jung H. Kim, Winser E. Alexander
ICDCS
1999
IEEE
15 years 2 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
JUCS
2008
112views more  JUCS 2008»
14 years 10 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
ICIP
2008
IEEE
15 years 11 months ago
A connected path approach for staff detection on a music score
The preservation of many music works produced in the past entails their digitalization and consequent accessibility in an easy-tomanage digital format. Carrying this task manually...
Jaime S. Cardoso, Artur Capela, Ana Rebelo, Carlos...