Sciweavers

420 search results - page 55 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 7 days ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
HAIS
2011
Springer
14 years 3 months ago
Interval Type-2 Fuzzy Modelling and Simulated Annealing for Real-World Inventory Management
The modelling of real-world complex systems is an area of ongoing interest for the research community. Real-world systems present a variety of challenges not least of which is the ...
Simon Miller, Mario A. Góngora, Robert John
IEAAIE
1998
Springer
15 years 4 months ago
Complexity and Cognitive Computing
Abstract. This paper has as main goal to develop a hybrid expert system to minimize some of the complexity problems related to arti cial intelligence eld. For instance, we can ment...
Lourdes Mattos Brasil, Fernando Mendes de Azevedo,...
PRICAI
2004
Springer
15 years 5 months ago
Adaptive Model for Foreground Extraction in Adverse Lighting Conditions
Background elimination models are widely used in motion tracking systems. Our aim is to develop a system that performs reliably under adverse lighting conditions. In particular, th...
Stewart Greenhill, Svetha Venkatesh, Geoff A. W. W...
ACSAC
2001
IEEE
15 years 3 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson