Sciweavers

359 search results - page 57 / 72
» An Architecture for Intrusion Detection Using Autonomous Age...
Sort
View
DAGSTUHL
2003
13 years 9 months ago
Toward a Cognitive System Algebra: Application to Facial Expression Learning and Imitation
In this paper, we try to demonstrate the capability of a very simple architecture to learn to recognize and reproduce facial expressions without the innate capability to recognize ...
Philippe Gaussier, Ken Prepin, Jacqueline Nadel
ICICS
2003
Springer
14 years 23 days ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
AAAI
1992
13 years 8 months ago
Automatic Programming of Robots Using Genetic Programming
The goal in automatic programming is to get a computer to perform a task by telling it what needs to be done, rather than by explicitly programming it. This paper considers the ta...
John R. Koza, James Rice
DAC
2007
ACM
14 years 8 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
SISW
2003
IEEE
14 years 25 days ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng