Sciweavers

2278 search results - page 388 / 456
» Specification Techniques for Automatic Performance Analysis ...
Sort
View
CCS
2003
ACM
15 years 4 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
VCIP
2003
238views Communications» more  VCIP 2003»
15 years 19 days ago
Texture segmentation based on features in wavelet domain for image retrieval
Texture is a fundamental feature which provides significant information for image classification, and is an important content used in content-based image retrieval (CBIR) system. ...
Ying Liu, Si Wu, Xiaofang Zhou
TRECVID
2007
15 years 13 days ago
Eurecom at TRECVid 2007: Extraction of High-level Features
In this paper we describe our experiments for the high level features extraction task of TRECVid 2007. Our approach is different than previous submissions in that we have impleme...
Rachid Benmokhtar, Eric Galmar, Benoit Huet
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 9 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
CEC
2008
IEEE
15 years 5 months ago
Auto-tuning fuzzy granulation for evolutionary optimization
—Much of the computational complexity in employing evolutionary algorithms as optimization tool is due to the fitness function evaluation that may either not exist or be computat...
Mohsen Davarynejad, Mohammad R. Akbarzadeh-Totonch...