Sciweavers

4330 search results - page 781 / 866
» Analyzing security architectures
Sort
View
141
Voted
CN
2002
98views more  CN 2002»
15 years 3 months ago
New models and algorithms for programmable networks
In todays IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to la...
Danny Raz, Yuval Shavitt
155
Voted
JSS
2002
198views more  JSS 2002»
15 years 3 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
155
Voted
NPL
1998
133views more  NPL 1998»
15 years 3 months ago
Parallel Coarse Grain Computing of Boltzmann Machines
Abstract. The resolution of combinatorial optimization problems can greatly benefit from the parallel and distributed processing which is characteristic of neural network paradigm...
Julio Ortega, Ignacio Rojas, Antonio F. Día...
PAMI
2002
86views more  PAMI 2002»
15 years 3 months ago
Recognizing Mathematical Expressions Using Tree Transformation
We describe a robust and efficient system for recognizing typeset and handwritten mathematical notation. From a list of symbols with bounding boxes the system analyzes an expressio...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
133
Voted
TNN
1998
146views more  TNN 1998»
15 years 3 months ago
An analytical framework for local feedforward networks
Interference in neural networks occurs when learning in one area of the input space causes unlearning in another area. Networks that are less susceptible to interference are refer...
S. Weaver, L. Baird, Marios M. Polycarpou