Sciweavers

2269 search results - page 363 / 454
» Behavioral Intrusion Detection
Sort
View
FQAS
2004
Springer
126views Database» more  FQAS 2004»
14 years 3 months ago
Cluster Characterization through a Representativity Measure
Clustering is an unsupervised learning task which provides a decomposition of a dataset into subgroups that summarize the initial base and give information about its structure. We ...
Marie-Jeanne Lesot, Bernadette Bouchon-Meunier
CA
2003
IEEE
14 years 3 months ago
Modeling Hair Using Level-of-Detail Representations
: We present a novel approach for modeling hair using level-of-detail representations. The set of representations include individual strands, hair clusters, and hair strips. They a...
Kelly Ward, Ming C. Lin, Joohi Lee, Susan Fisher, ...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 3 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
VISUALIZATION
2002
IEEE
14 years 3 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
IJCNN
2000
IEEE
14 years 2 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta