Sciweavers

5234 search results - page 884 / 1047
» Method Components - Rationale Revealed
Sort
View
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 9 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 9 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
WEBI
2005
Springer
15 years 9 months ago
Integrating Element and Term Semantics for Similarity-Based XML Document Clustering
Structured link vector model (SLVM) is a recently proposed document representation that takes into account both structural and semantic information for measuring XML document simi...
Jianwu Yang, William K. Cheung, Xiaoou Chen
136
Voted
GRAPHITE
2004
ACM
15 years 9 months ago
Statistical synthesis of facial expressions for the portrayal of emotion
This paper presents a novel technique for the generation of ‘video textures’ to display human emotion. This is achieved by a method which uses existing video footage to synthe...
Lisa Gralewski, Neill W. Campbell, Barry T. Thomas...
SAC
2004
ACM
15 years 9 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...