Sciweavers

2236 search results - page 115 / 448
» Intrusion detection techniques and approaches
Sort
View
75
Voted
ICNS
2009
IEEE
15 years 4 months ago
Advanced Hash Algorithms with Key Bits Duplication for IP Address Lookup
Hashing technique have been widely adopted for various computer network applications such as IP address lookup and intrusion detection, among which XOR-hashing is one of most popu...
Christopher J. Martinez, Wei-Ming Lin
CAISE
2009
Springer
15 years 4 months ago
Measuring and Comparing Effectiveness of Data Quality Techniques
Abstract. Poor quality data may be detected and corrected by performing various quality assurance activities that rely on techniques with different efficacy and cost. In this pape...
Lei Jiang, Daniele Barone, Alexander Borgida, John...
SCIA
2005
Springer
186views Image Analysis» more  SCIA 2005»
15 years 3 months ago
Levelset and B-Spline Deformable Model Techniques for Image Segmentation: A Pragmatic Comparative Study
Deformable contours are now widely used in image segmentation, using different models, criteria and numeric schemes. Some theoretical comparisons between few deformable model met...
Diane Lingrand, Johan Montagnat
MOBICOM
2004
ACM
15 years 3 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...
ACL
1997
14 years 11 months ago
An Alignment Method for Noisy Parallel Corpora based on Image Processing Techniques
This paper presents a new approach to bitext correspondence problem (BCP) of noisy bilingual corpora based on image processing (IP) techniques. By using one of several ways of est...
Jason S. Chang, Mathis H. M. Chen