Sciweavers

41 search results - page 7 / 9
» Clustering-based approach to identify solutions for the infe...
Sort
View
CRISIS
2008
13 years 10 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
ICASSP
2009
IEEE
14 years 3 months ago
A Bayesian NETWORKS approach for dialog modeling: The fusion BN
Bayesian Networks, BNs, are suitable for mixed-initiative dialog modeling allowing a more flexible and natural spoken interaction. This solution can be applied to identify the in...
Fernando F. Fernández-Martínez, Javi...
IJSN
2006
124views more  IJSN 2006»
13 years 8 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
SAC
2004
ACM
14 years 1 months ago
Time-frequency feature detection for time-course microarray data
Gene clustering based on microarray data provides useful functional information to the working biologists. Many current gene-clustering algorithms rely on Euclidean-based distance...
Jiawu Feng, Paolo Emilio Barbano, Bud Mishra
ASIAN
2004
Springer
153views Algorithms» more  ASIAN 2004»
14 years 8 days ago
Chi-Square Matrix: An Approach for Building-Block Identification
This paper presents a line of research in genetic algorithms (GAs), called building-block identification. The building blocks (BBs) are common structures inferred from a set of sol...
Chatchawit Aporntewan, Prabhas Chongstitvatana