Sciweavers

14642 search results - page 73 / 2929
» It's Time for a Change
Sort
View
RAID
2004
Springer
15 years 7 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
ISCAS
2008
IEEE
93views Hardware» more  ISCAS 2008»
15 years 8 months ago
SOM with False-Neighbor degree and its behaviors
— This study improves SOM with False-Neighbor degree between neurons (FN-SOM) which solves some problems of the original FN-SOM. The improved FN-SOM changes the neighborhood rela...
Haruna Matsushita, Yoshifumi Nishio
CIMCA
2005
IEEE
15 years 7 months ago
Fuzzy Inference Model for Learning from Experiences and Its Application to Robot Navigation
A fuzzy inference model for learning from experiences (FILE) is proposed. The model can learn from experience data obtained by trial-and-error of a task and it can stably learn fr...
Manabu Gouko, Yoshihiro Sugaya, Hirotomo Aso
IWSAS
2000
Springer
15 years 5 months ago
An Architecture for Self-Adaptation and Its Application to Aerial Image Understanding
Abstract. Certain problems in which the environment is not well constrained do not lend themselves to a conventional open loop solution. Image understanding is such a problem domai...
Paul Robertson
CSREASAM
2006
15 years 3 months ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...