Sciweavers

2019 search results - page 118 / 404
» On detecting differences between groups
Sort
View
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
109
Voted
3DPVT
2002
IEEE
119views Visualization» more  3DPVT 2002»
15 years 8 months ago
f3d - A File Format and Tools for Storage and Manipulation of Volumetric Data Sets
Different file formats for storage and manipulation of volumetric data exist today, but none of them has been accepted as a standard by the volume visualization and volume graphi...
Milos Srámek, Leonid I. Dimitrov
IWEC
2003
15 years 5 months ago
Emotional effects of shooting activities: 'real' versus 'virtual' actions and targets
: The results of an empirical study are presented to investigate the relationship between different action types (real versus virtual shooting) and different target types (real ver...
Matthias Rauterberg
BIBE
2007
IEEE
162views Bioinformatics» more  BIBE 2007»
15 years 10 months ago
An Investigation into the Feasibility of Detecting Microscopic Disease Using Machine Learning
— The prognosis for many cancers could be improved dramatically if they could be detected while still at the microscopic disease stage. We are investigating the possibility of de...
Mary Qu Yang, Jack Y. Yang
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...