Sciweavers

230 search results - page 36 / 46
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
14 years 29 days ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
MVA
2007
13 years 9 months ago
Semi-supervised Incremental Learning of Manipulative Tasks
For a social robot, the ability of learning tasks via human demonstration is very crucial. But most current approaches suffer from either the demanding of the huge amount of label...
Zhe Li, Sven Wachsmuth, Jannik Fritsch, Gerhard Sa...
SCFBM
2008
107views more  SCFBM 2008»
13 years 7 months ago
Microbial Diagnostic Array Workstation (MDAW): a web server for diagnostic array data storage, sharing and analysis
Background: Microarrays are becoming a very popular tool for microbial detection and diagnostics. Although these diagnostic arrays are much simpler when compared to the traditiona...
Joy Scaria, Aswathy Sreedharan, Yung-Fu Chang
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
CVPR
2005
IEEE
14 years 9 months ago
Generative versus Discriminative Methods for Object Recognition
Many approaches to object recognition are founded on probability theory, and can be broadly characterized as either generative or discriminative according to whether or not the di...
Ilkay Ulusoy, Christopher M. Bishop