Sciweavers

389 search results - page 63 / 78
» Class-Driven Attribute Extraction
Sort
View
VISUALIZATION
2003
IEEE
14 years 1 months ago
Chameleon: An interactive texture-based rendering framework for visualizing three-dimensional vector fields
In this paper we present an interactive texture-based technique for visualizing three-dimensional vector fields. The goal of the algorithm is to provide a general volume renderin...
Guo-Shi Li, Udeepta Bordoloi, Han-Wei Shen
CCS
2003
ACM
14 years 1 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 1 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
WISE
2000
Springer
14 years 1 months ago
Modelling the Webspace of an Intranet
Searching the internet using the currently available searchengines is not satisfactory. Thetechniquesused there focus on the extraction of relevant informationdirectlyfrom the doc...
Roelof van Zwol, Peter M. G. Apers