Sciweavers

10406 search results - page 1881 / 2082
» Using RDF to Model the Structure and Process of Systems
Sort
View
ASIAMS
2008
IEEE
15 years 11 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
CEEMAS
2007
Springer
15 years 10 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ESOP
2005
Springer
15 years 10 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
15 years 9 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
ICCBR
2003
Springer
15 years 9 months ago
Case Mining from Large Databases
Abstract. This paper presents an approach of case mining to automatically discover case bases from large datasets in order to improve both the speed and the quality of case based r...
Qiang Yang, Hong Cheng
« Prev « First page 1881 / 2082 Last » Next »