Sciweavers

407 search results - page 32 / 82
» Can search systems detect users' task difficulty
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 2 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
IEEEARES
2010
IEEE
14 years 22 days ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
BMCBI
2010
183views more  BMCBI 2010»
13 years 9 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
ADC
2008
Springer
153views Database» more  ADC 2008»
13 years 10 months ago
A Confidence Based Recognition System for TV Commercial Extraction
Automatic real-time recognition of TV commercials is an essential step for TV broadcast monitoring. It comprises two basic tasks: rapid detection of known commercials that are sto...
Yijun Li, Dianqing Zhang, Xiangmin Zhou, Jesse S. ...