Sciweavers

447 search results - page 74 / 90
» New Metrics for Evaluation of Collision Detection Techniques
Sort
View
VIZSEC
2005
Springer
15 years 6 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
TASLP
2008
129views more  TASLP 2008»
15 years 1 months ago
Chroma Binary Similarity and Local Alignment Applied to Cover Song Identification
Abstract--We present a new technique for audio signal comparison based on tonal subsequence alignment and its application to detect cover versions (i.e., different performances of ...
Joan Serrà, Emilia Gómez, Perfecto H...
CONEXT
2006
ACM
15 years 5 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
AIPS
2010
15 years 3 months ago
Improving Determinization in Hindsight for On-line Probabilistic Planning
Recently, `determinization in hindsight' has enjoyed surprising success in on-line probabilistic planning. This technique evaluates the actions available in the current state...
Sung Wook Yoon, Wheeler Ruml, J. Benton, Minh Do
BMCBI
2010
155views more  BMCBI 2010»
15 years 1 months ago
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
Background: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of...
Fan Shi, Christopher Leckie, Geoff MacIntyre, Izha...