Sciweavers

531 search results - page 58 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
16 years 1 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
CCS
2010
ACM
15 years 1 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
JPDC
2008
217views more  JPDC 2008»
15 years 1 months ago
Parallel techniques for information extraction from hyperspectral imagery using heterogeneous networks of workstations
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. In particular, NASA is continuously gath...
Antonio J. Plaza
IJON
2008
186views more  IJON 2008»
15 years 1 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
IJON
2007
68views more  IJON 2007»
15 years 1 months ago
A self-organizing map of sigma-pi units
By frame of reference transformations, an input variable in one coordinate system is transformed into an output variable in a different coordinate system depending on another inpu...
Cornelius Weber, Stefan Wermter