: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
End-to-end packet-pair probing has been used as one of the primary mechanisms to measure bottleneck capacity, crosstraffic intensity, and available bandwidth of end-to-end Internet...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...
Most algorithms for extracting illuminant chromaticity from arbitrary images, such as the images found on the web, are based on machine learning techniques. We will show how a phy...
In this paper, we propose an attribute retrieval approach which extracts and ranks attributes from HTML tables. We distinguish between class attribute retrieval and instance attri...
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...