Sciweavers

1110 search results - page 175 / 222
» Clustering with the Connectivity Kernel
Sort
View
ACSAC
2004
IEEE
14 years 17 days ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
ICALP
2010
Springer
13 years 10 months ago
The Cooperative Game Theory Foundations of Network Bargaining Games
We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided amon...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi, ...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 9 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
PAMI
2007
154views more  PAMI 2007»
13 years 8 months ago
Graph Embedding and Extensions: A General Framework for Dimensionality Reduction
—Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different soluti...
Shuicheng Yan, Dong Xu, Benyu Zhang, HongJiang Zha...
MICCAI
2009
Springer
14 years 9 months ago
Nonparametric Mean Shift Functional Detection in the Functional Space for Task and Resting-state fMRI
In functional Magnetic Resonance Imaging (fMRI) data analysis, normalization of time series is an important and sometimes necessary preprocessing step in many widely used methods. ...
Jian Cheng, Feng Shi, Kun Wang, Ming Song, Jiefeng...