Sciweavers

772 search results - page 98 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
ICPR
2010
IEEE
14 years 10 months ago
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT
The quality of the lung nodule models determines the success of lung nodule detection. This paper describes aspects of our data-driven approach for modeling lung nodules using the...
Amal Farag, James Graham, Aly A. Farag
IWIA
2005
IEEE
15 years 5 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
CLEF
2009
Springer
15 years 28 days ago
MorphoNet: Exploring the Use of Community Structure for Unsupervised Morpheme Analysis
This paper investigates a novel approach to unsupervised morphology induction relying on community detection in networks. In a first step, morphological transformation rules are a...
Delphine Bernhard
BMCBI
2006
117views more  BMCBI 2006»
14 years 12 months ago
The Cluster Variation Method for Efficient Linkage Analysis on Extended Pedigrees
Background: Computing exact multipoint LOD scores for extended pedigrees rapidly becomes infeasible as the number of markers and untyped individuals increase. When markers are exc...
Cornelis A. Albers, Martijn A. R. Leisink, Hilbert...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao