Sciweavers

606 search results - page 106 / 122
» A Morphological Neural Network Approach to Information Retri...
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JCNS
2010
100views more  JCNS 2010»
13 years 2 months ago
Methods for predicting cortical UP and DOWN states from the phase of deep layer local field potentials
During anesthesia, slow-wave sleep and quiet wakefulness, neuronal membrane potentials collectively switch between de- and hyperpolarized levels, the cortical UP and DOWN states. P...
Aman B. Saleem, Paul Chadderton, John Apergis-Scho...
HICSS
1998
IEEE
195views Biometrics» more  HICSS 1998»
13 years 11 months ago
Augmenting User Interfaces for Digital Libraries with Virtual Reality
This paper describes a generic approach to the development of a virtual reality-based user interface for a collection of digital documents. We emphasise the role of intrinsic inte...
Chaomei Chen
INFOCOM
2012
IEEE
11 years 10 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
NAR
2007
216views more  NAR 2007»
13 years 7 months ago
SYSTOMONAS - an integrated database for systems biology analysis of Pseudomonas
To provide an integrated bioinformatics platform for a systems biology approach to the biology of pseudomonads in infection and biotechnology the database SYSTOMONAS (SYSTems biol...
Claudia Choi, Richard Münch, Stefan Leupold, ...