Sciweavers

319 search results - page 53 / 64
» A Compound Intrusion Detection Model
Sort
View
ANCS
2009
ACM
13 years 5 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
AMDO
2010
Springer
13 years 5 months ago
Multiple-Activity Human Body Tracking in Unconstrained Environments
We propose a method for human full-body pose tracking from measurements of wearable inertial sensors. Since the data provided by such sensors is sparse, noisy and often ambiguous, ...
Loren Arthur Schwarz, Diana Mateus, Nassir Navab
BIRD
2007
Springer
13 years 11 months ago
An Evaluation of Text Retrieval Methods for Similarity Search of Multi-dimensional NMR-Spectra
Abstract. Searching and mining nuclear magnetic resonance (NMR)spectra of naturally occurring substances is an important task to investigate new potentially useful chemical compoun...
Alexander Hinneburg, Andrea Porzel, Karina Wolfram
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 11 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
14 years 4 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal