Sciweavers

10599 search results - page 1924 / 2120
» Measure Based Regularization
Sort
View
ACMSE
2005
ACM
15 years 9 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
IMC
2005
ACM
15 years 9 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
MM
2005
ACM
111views Multimedia» more  MM 2005»
15 years 9 months ago
A flexible system for creating music while interacting with the computer
Music is a very important part of our lives. People enjoy listening to the music, and many of us find a special pleasure in creating the music. Computers further extended many asp...
Zeljko Obrenovic
129
Voted
MSWIM
2005
ACM
15 years 9 months ago
Sensor-assisted wi-fi indoor location system for adapting to environmental dynamics
Wi-Fi based indoor location systems have been shown to be both cost-effective and accurate, since they can attain meter-level positioning accuracy by using existing Wi-Fi infrastr...
Yi-Chao Chen, Ji-Rung Chiang, Hao-Hua Chu, Polly H...
156
Voted
ASIACRYPT
2005
Springer
15 years 9 months ago
Adapting Density Attacks to Low-Weight Knapsacks
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
Phong Q. Nguyen, Jacques Stern
« Prev « First page 1924 / 2120 Last » Next »