Sciweavers

1437 search results - page 156 / 288
» Content Extraction Signatures
Sort
View
BC
2000
81views more  BC 2000»
15 years 2 months ago
Insect visual homing strategies in a robot with analog processing
Abstract The visual homing abilities of insects can be explained by the snapshot hypothesis. It asserts that an animal is guided to a previously visited location by comparing the c...
Ralf Möller
131
Voted
SRDS
2010
IEEE
15 years 11 days ago
Invariants Based Failure Diagnosis in Distributed Computing Systems
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our meth...
Haifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhil...
140
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 9 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
AAAI
2012
13 years 4 months ago
Non-Intrusive Load Monitoring Using Prior Models of General Appliance Types
Non-intrusive appliance load monitoring is the process of disaggregating a household’s total electricity consumption into its contributing appliances. In this paper we propose a...
Oliver Parson, Siddhartha Ghosh, Mark Weal, Alex R...
AINA
2007
IEEE
15 years 8 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...