Sciweavers

135 search results - page 6 / 27
» Bounded Vector Signatures and their Applications
Sort
View
IJON
2011
158views more  IJON 2011»
13 years 2 months ago
Maximal Discrepancy for Support Vector Machines
Several theoretical methods have been developed in the past years to evaluate the generalization ability of a classifier: they provide extremely useful insights on the learning ph...
Davide Anguita, Alessandro Ghio, Sandro Ridella
ICARIS
2007
Springer
14 years 1 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
NDSS
2008
IEEE
14 years 1 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ATS
2005
IEEE
100views Hardware» more  ATS 2005»
14 years 1 months ago
A Methodology to Compute Bounds on Crosstalk Effects in Arbitrary Interconnects
In this paper, we present a methodology that uses the moments of a generic crosstalk pulse signal to derive upper bounds on the amplitude of crosstalk pulse in arbitrary interconn...
Wichian Sirisaengtaksin, Sandeep K. Gupta
ICIP
2001
IEEE
14 years 9 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang