Sciweavers

457 search results - page 24 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
CVPR
2012
IEEE
11 years 9 months ago
Coupling detection and data association for multiple object tracking
We present a novel framework for multiple object tracking in which the problems of object detection and data association are expressed by a single objective function. The framewor...
Zheng Wu, Ashwin Thangali, Stan Sclaroff, Margrit ...
TPDS
2010
113views more  TPDS 2010»
13 years 1 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 11 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 6 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
14 years 1 days ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James