Sciweavers

325 search results - page 15 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SIGMETRICS
1987
ACM
102views Hardware» more  SIGMETRICS 1987»
13 years 11 months ago
Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment
Expressions are found for the throughput and delay performance of a Tree Conflict Resolution Algorithm that is used in a Local Area Network with carrier sensing (and possibly also ...
George C. Polyzos, Mart Molle
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
15 years 11 days ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...
ICIAP
2007
ACM
14 years 1 months ago
Image Spam Filtering Using Visual Information
We address the problem of recognizing the so-called image spam, which consists in embedding the spam message into attached images to defeat techniques based on the analysis of e-m...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...
BIS
2008
92views Business» more  BIS 2008»
13 years 8 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann