Sciweavers

311 search results - page 56 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
AAAI
2008
13 years 9 months ago
Markov Blanket Feature Selection for Support Vector Machines
Based on Information Theory, optimal feature selection should be carried out by searching Markov blankets. In this paper, we formally analyze the current Markov blanket discovery ...
Jianqiang Shen, Lida Li, Weng-Keen Wong
ICPR
2006
IEEE
14 years 8 months ago
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis
Computer based analysis for automated segmentation of blood vessels in retinal images will help eye care specialists screen larger populations for vessel abnormalities. However, a...
Qin Li, Lei Zhang, David Zhang, Prabir Bhattachary...
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 1 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
MLMI
2004
Springer
14 years 27 days ago
Piecing Together the Emotion Jigsaw
People are emotional, and machines are not. That constrains their communication, and defines a key challenge for the information sciences. Different groups have addressed it from d...
Roddy Cowie, Marc Schröder
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...