Sciweavers

1437 search results - page 156 / 288
» Content Extraction Signatures
Sort
View
BC
2000
81views more  BC 2000»
13 years 10 months ago
Insect visual homing strategies in a robot with analog processing
Abstract The visual homing abilities of insects can be explained by the snapshot hypothesis. It asserts that an animal is guided to a previously visited location by comparing the c...
Ralf Möller
SRDS
2010
IEEE
13 years 8 months ago
Invariants Based Failure Diagnosis in Distributed Computing Systems
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our meth...
Haifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhil...
JMLR
2010
185views more  JMLR 2010»
13 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
AAAI
2012
12 years 13 days ago
Non-Intrusive Load Monitoring Using Prior Models of General Appliance Types
Non-intrusive appliance load monitoring is the process of disaggregating a household’s total electricity consumption into its contributing appliances. In this paper we propose a...
Oliver Parson, Siddhartha Ghosh, Mark Weal, Alex R...
AINA
2007
IEEE
14 years 4 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...