Sciweavers

42 search results - page 5 / 9
» Detecting Areas Visited Regularly
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
13 years 11 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
NAR
2007
116views more  NAR 2007»
13 years 6 months ago
Protein knot server: detection of knots in protein structures
KNOTS (http://knots.mit.edu) is a web server that detects knots in protein structures. Several protein structures have been reported to contain intricate knots. The physiological ...
Grigory Kolesov, Peter Virnau, Mehran Kardar, Leon...
ATAL
2010
Springer
13 years 6 months ago
On events in multi-robot patrol in adversarial environments
The problem of multi-robot patrol in adversarial environments has been gaining considerable interest during the recent years.In this problem, a team of mobile robots is required t...
Noa Agmon
WSCG
2004
196views more  WSCG 2004»
13 years 8 months ago
Feature Extraction of Scale Pattern in Animal Textile Fibers
: Animal fibers have variety in their longitudinal sections. The main difference of the longitudinal section of these fibers is the geometry and dimension of scale patterns, which ...
Reza Hasanzadeh Pak Rezaie, Karim Faez, Samira Asl...
AVI
2004
13 years 8 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti