Sciweavers

2953 search results - page 431 / 591
» A Feature Selection Technique based on Distributional Differ...
Sort
View
IAJIT
2011
13 years 22 days ago
A hierarchical K-NN classifier for textual data
: This paper presents a classifier that is based on a modified version of the well known K-Nearest Neighbors classifier (K-NN). The original K-NN classifier was adjusted to work wi...
Rehab M. Duwairi, Rania Al-Zubaidi
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
CMSB
2006
Springer
14 years 1 months ago
Probabilistic Model Checking of Complex Biological Pathways
Abstract. Probabilistic model checking is a formal verification technique that has been successfully applied to the analysis of systems from a broad range of domains, including sec...
John Heath, Marta Z. Kwiatkowska, Gethin Norman, D...
MSS
1999
IEEE
99views Hardware» more  MSS 1999»
14 years 1 months ago
Clustered Multi-media NOD: Popularity-based Article Prefetching and Placement
According to the current profound development of multimedia and networking technologies, the way people communicate with, naturally, has evolved from a textoriented into a multime...
Y.-J. Kim, Tae-uk Choi, K. O. Jung, Y. K. Kang, Se...
ADHOCNETS
2010
Springer
13 years 6 months ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch