Sciweavers

1737 search results - page 290 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
EDBT
2009
ACM
81views Database» more  EDBT 2009»
15 years 4 months ago
Exploiting similarity-aware grouping in decision support systems
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these systems are built on top of data managed by DBMSs and make e...
Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref
ICCVW
1999
Springer
15 years 4 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson
ISBI
2011
IEEE
14 years 3 months ago
Sparse topological data recovery in medical images
For medical image analysis, the test statistic of the measurements is usually constructed at every voxels in space and thresholded to determine the regions of significant signals...
Moo K. Chung, Hyekyoung Lee, Peter T. Kim, Jong Ch...
IMC
2006
ACM
15 years 5 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 1 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...