Sciweavers

188 search results - page 21 / 38
» Detecting Anomalies Using End-to-End Path Measurements
Sort
View
113
Voted
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
147
Voted
MVA
2007
153views Computer Vision» more  MVA 2007»
15 years 3 months ago
An image-based feature tracking algorithm for real-time measurement of clad height
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Mehrdad Iravani-Tabrizipour, Ehsan Toyserkani
129
Voted
NIPS
2008
15 years 5 months ago
Empirical performance maximization for linear rank statistics
The ROC curve is known to be the golden standard for measuring performance of a test/scoring statistic regarding its capacity of discrimination between two populations in a wide v...
Stéphan Clémençon, Nicolas Va...
148
Voted
ADHOCNOW
2008
Springer
15 years 10 months ago
Geographic Routing with Early Obstacles Detection and Avoidance in Dense Wireless Sensor Networks
Existing geographic routing algorithms for sensor networks are mainly concerned with finding a path toward a destination, without explicitly addressing the impact of obstacles on ...
Luminita Moraru, Pierre Leone, Sotiris E. Nikolets...
152
Voted
IAT
2007
IEEE
15 years 7 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...