Sciweavers

319 search results - page 53 / 64
» A Compound Intrusion Detection Model
Sort
View
146
Voted
ANCS
2009
ACM
15 years 19 days ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
168
Voted
AMDO
2010
Springer
15 years 25 days ago
Multiple-Activity Human Body Tracking in Unconstrained Environments
We propose a method for human full-body pose tracking from measurements of wearable inertial sensors. Since the data provided by such sensors is sparse, noisy and often ambiguous, ...
Loren Arthur Schwarz, Diana Mateus, Nassir Navab
122
Voted
BIRD
2007
Springer
15 years 6 months ago
An Evaluation of Text Retrieval Methods for Similarity Search of Multi-dimensional NMR-Spectra
Abstract. Searching and mining nuclear magnetic resonance (NMR)spectra of naturally occurring substances is an important task to investigate new potentially useful chemical compoun...
Alexander Hinneburg, Andrea Porzel, Karina Wolfram
108
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 7 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
125
Voted
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
16 years 3 hour ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal