Sciweavers

123 search results - page 21 / 25
» A network intrusion detection method using independent compo...
Sort
View

Book
640views
15 years 7 months ago
Introduction to Pattern Recognition
"Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typical...
Sargur Srihari
CGA
2005
13 years 8 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
ICDCS
2011
IEEE
12 years 8 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...
ICASSP
2011
IEEE
13 years 9 days ago
Distributed blind source separation with an application to audio signals
A scalable blind source separation paradigm aimed at sensor networks is described. The approach facilitates an unlimited number of sensors and sources and does not require a fusio...
Yusuke Hioka, W. Bastiaan Kleijn
BMCBI
2007
113views more  BMCBI 2007»
13 years 8 months ago
Analysis and prediction of antibacterial peptides
Background: Antibacterial peptides are important components of the innate immune system, used by the host to protect itself from different types of pathogenic bacteria. Over the l...
Sneh Lata, B. K. Sharma, G. P. S. Raghava