Sciweavers

135 search results - page 6 / 27
» Bounded Vector Signatures and their Applications
Sort
View
IJON
2011
158views more  IJON 2011»
14 years 10 months ago
Maximal Discrepancy for Support Vector Machines
Several theoretical methods have been developed in the past years to evaluate the generalization ability of a classifier: they provide extremely useful insights on the learning ph...
Davide Anguita, Alessandro Ghio, Sandro Ridella
ICARIS
2007
Springer
15 years 9 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
127
Voted
NDSS
2008
IEEE
15 years 9 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ATS
2005
IEEE
100views Hardware» more  ATS 2005»
15 years 9 months ago
A Methodology to Compute Bounds on Crosstalk Effects in Arbitrary Interconnects
In this paper, we present a methodology that uses the moments of a generic crosstalk pulse signal to derive upper bounds on the amplitude of crosstalk pulse in arbitrary interconn...
Wichian Sirisaengtaksin, Sandeep K. Gupta
129
Voted
ICIP
2001
IEEE
16 years 5 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang