Sciweavers

872 search results - page 68 / 175
» Sketch-based change detection: methods, evaluation, and appl...
Sort
View
CSDA
2008
147views more  CSDA 2008»
14 years 12 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
ICPR
2002
IEEE
16 years 28 days ago
A Ball Detection Algorithm for Real Soccer Image Sequences
A large number of methods for circle detection has been studied in the last years for numerous image processing applications. The application domain considered in this paper is th...
Tiziana D'Orazio, Nicola Ancona, Grazia Cicirelli,...
INFOCOM
2011
IEEE
14 years 3 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
VLDB
1991
ACM
104views Database» more  VLDB 1991»
15 years 3 months ago
A Metadata Approach to Resolving Semantic Conflicts
In this paper we describe a rule-based approach to semantic specification that can be used to establish semantic agreement between a source and receiver. Query processing techniqu...
Michael Siegel, Stuart E. Madnick
CEC
2011
IEEE
13 years 11 months ago
Inferring transcriptional regulators for sets of co-expressed genes by multi-objective evolutionary optimization
Abstract—Higher organisms are able to respond to continuously changing external conditions by transducing cellular signals into specific regulatory programs, which control gene ...
Adrian Schröder, Clemens Wrzodek, Johannes Wo...