Sciweavers

2686 search results - page 338 / 538
» Using a neural network in the software testing process
Sort
View
148
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
117
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Model Selection via Bilevel Optimization
— A key step in many statistical learning methods used in machine learning involves solving a convex optimization problem containing one or more hyper-parameters that must be sel...
Kristin P. Bennett, Jing Hu, Xiaoyun Ji, Gautam Ku...
155
Voted
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
15 years 10 months ago
Single camera vision-only SLAM on a suburban road network
—Simultaneous Localization And Mapping (SLAM) is one of the major challenges in mobile robotics. Probabilistic techniques using high-end range finding devices are well establishe...
Michael Milford, Gordon Wyeth
238
Voted
CSE
2011
IEEE
14 years 3 months ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...
145
Voted
ASIAMS
2008
IEEE
15 years 10 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...