Sciweavers

5962 search results - page 878 / 1193
» Working with Patterns and Code
Sort
View
129
Voted
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 4 months ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...
150
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 4 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
151
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
CLEIEJ
2007
152views more  CLEIEJ 2007»
15 years 4 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
IJMMS
2006
74views more  IJMMS 2006»
15 years 4 months ago
Constructing computer-based tutors that are socially sensitive: Politeness in educational software
Students rated 16 tutorial statements on negative politeness (i.e., how much the tutor ``allows me freedom to make my own decisions'') and positive politeness (i.e., how...
Richard E. Mayer, W. Lewis Johnson, Erin Shaw, Sah...