Sciweavers

3791 search results - page 618 / 759
» Packing sets of patterns
Sort
View
130
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 3 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
158
Voted
GRID
2006
Springer
15 years 3 months ago
Snapshot Processing in Streaming Environments
Monitoring and correlation of streaming data from multiple sources is becoming increasingly important in many application areas. Example applications include automated commodities...
Daniel M. Zimmerman, K. Mani Chandy
140
Voted
CLEIEJ
2007
152views more  CLEIEJ 2007»
15 years 3 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
122
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 3 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IJDSN
2006
146views more  IJDSN 2006»
15 years 3 months ago
Efficient Broadcasting in Self-Organizing Sensor Networks
Multi-hop wireless networks (such as ad-hoc or sensor networks) consist in sets of mobile nodes without the support of a pre-existing fixed infrastructure. For scalability purpose...
Nathalie Mitton, Anthony Busson, Eric Fleury