Sciweavers

2414 search results - page 191 / 483
» Computing Normal Subgroups
Sort
View
IWCMC
2006
ACM
14 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
WACV
2005
IEEE
14 years 2 months ago
Patchlets: Representing Stereo Vision Data with Surface Elements
This paper describes a class of augmented surface elements which we call patchlets. Patchlets are planar surface elements generated from dense stereo vision 3D range images. Patch...
Don Murray, James J. Little
DIS
2005
Springer
14 years 2 months ago
Movement Analysis of Medaka (Oryzias Latipes) for an Insecticide Using Decision Tree
Abstract. Behavioral sequences of the medaka (Oryzias latipes) were continuously investigated through an automatic image recognition system in response to medaka treated with the i...
Sengtai Lee, Jeehoon Kim, Jae-Yeon Baek, Man-Wi Ha...
ISMIS
2005
Springer
14 years 2 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
TARK
2005
Springer
14 years 2 months ago
First-order classical modal logic: applications in logics of knowledge and probability
The paper focuses on extending to the first order case the semantical program for modalities first introduced by Dana Scott and Richard Montague. We focus on the study of neighb...
Horacio L. Arló-Costa, Eric Pacuit