Sciweavers

165 search results - page 15 / 33
» Soft computing in intrusion detection: the state of the art
Sort
View
114
Voted
ICPR
2010
IEEE
15 years 2 months ago
Detecting Faint Compact Sources Using Local Features and a Boosting Approach
Several techniques have been proposed so far in order to perform faint compact source detection in wide field interferometric radio images. However, all these methods can easily mi...
Albert Torrent, Marta Peracaula, Xavier Llado, Jor...
104
Voted
BMCBI
2008
102views more  BMCBI 2008»
14 years 11 months ago
Fast splice site detection using information content and feature reduction
Background: Accurate identification of splice sites in DNA sequences plays a key role in the prediction of gene structure in eukaryotes. Already many computational methods have be...
A. K. M. A. Baten, Saman K. Halgamuge, Bill C. H. ...
89
Voted
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 6 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 3 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
PAMI
2010
205views more  PAMI 2010»
14 years 10 months ago
Learning a Hierarchical Deformable Template for Rapid Deformable Object Parsing
In this paper, we address the tasks of detecting, segmenting, parsing, and matching deformable objects. We use a novel probabilistic object model that we call a hierarchical defor...
Long Zhu, Yuanhao Chen, Alan L. Yuille