Sciweavers

2900 search results - page 78 / 580
» On the Convergence of Immune Algorithms
Sort
View
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 4 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ACSAC
2001
IEEE
15 years 3 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
RAS
2000
70views more  RAS 2000»
14 years 11 months ago
Feature extraction and tracking for scanning range sensors
A solution to the problem of simultaneously extracting and tracking a piecewise-linear range representation of a mobile robot's local environment is presented. The classical ...
Nick E. Pears
CORR
2006
Springer
172views Education» more  CORR 2006»
14 years 12 months ago
Approximate Convex Optimization by Online Game Playing
This paper describes a general framework for converting online game playing algorithms into constrained convex optimization algorithms. This framework allows us to convert the wel...
Elad Hazan
CORR
2010
Springer
122views Education» more  CORR 2010»
14 years 12 months ago
A Unified Algorithmic Framework for Multi-Dimensional Scaling
In this paper, we propose a unified algorithmic framework for solving many known variants of MDS. Our algorithm is a simple iterative scheme with guaranteed convergence, and is mo...
Arvind Agarwal, Jeff M. Phillips, Suresh Venkatasu...