Sciweavers

9316 search results - page 53 / 1864
» Analysis of traceback techniques
Sort
View
COMCOM
2002
189views more  COMCOM 2002»
13 years 10 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
ICDCSW
2006
IEEE
14 years 4 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
AI
2006
Springer
14 years 2 months ago
On the Performance of Chernoff-Distance-Based Linear Dimensionality Reduction Techniques
Abstract. We present a performance analysis of three linear dimensionality reduction techniques: Fisher's discriminant analysis (FDA), and two methods introduced recently base...
Mohammed Liakat Ali, Luis Rueda, Myriam Herrera
CAIP
1999
Springer
190views Image Analysis» more  CAIP 1999»
14 years 3 months ago
Image Stitching - Comparisons and New Techniques
In this work, we are mainly dealing with the stitching of panoramic images. However, the methods described and evaluated here can also be used for different applications in image ...
Chia-Yen Chen, Reinhard Klette
WOSP
2004
ACM
14 years 4 months ago
Experimenting different software architectures performance techniques: a case study
In this paper we describe our experience in performance analysis of the software architecture of the NICE case study which is responsible for providing several secure communicatio...
Simonetta Balsamo, Moreno Marzolla, Antinisca Di M...