Sciweavers

2269 search results - page 384 / 454
» Behavioral Intrusion Detection
Sort
View
NN
2004
Springer
102views Neural Networks» more  NN 2004»
14 years 3 months ago
A Quantitative Evaluation of a Bio-inspired Sound Segregation Technique for Two- and Three-Source Mixtures
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
Ramin Pichevar, Jean Rouat
HUC
2009
Springer
14 years 1 months ago
Playful bottle: a mobile social persuasion system to motivate healthy water intake
This study of mobile persuasion system explores the use of a mobile phone, when attached to an everyday object used by an everyday behavior, becomes a tool to sense and influence ...
Meng-Chieh Chiu, Shih-Ping Chang, Yu-Chen Chang, H...
GECCO
2008
Springer
154views Optimization» more  GECCO 2008»
13 years 11 months ago
Automated shape composition based on cell biology and distributed genetic programming
Motivated by the ability of living cells to form specific shapes and structures, we present a computational approach using distributed genetic programming to discover cell-cell i...
Linge Bai, Manolya Eyiyurekli, David E. Breen
RAID
2010
Springer
13 years 8 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
MEMOCODE
2010
IEEE
13 years 8 months ago
Proving transaction and system-level properties of untimed SystemC TLM designs
Electronic System Level (ESL) design manages the complexity of todays systems by using abstract models. In this context Transaction Level Modeling (TLM) is state-of-theart for desc...
Daniel Große, Hoang M. Le, Rolf Drechsler