Sciweavers

325 search results - page 15 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 2 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SIGMETRICS
1987
ACM
102views Hardware» more  SIGMETRICS 1987»
15 years 6 months ago
Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment
Expressions are found for the throughput and delay performance of a Tree Conflict Resolution Algorithm that is used in a Local Area Network with carrier sensing (and possibly also ...
George C. Polyzos, Mart Molle
159
Voted
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
16 years 7 months ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...
ICIAP
2007
ACM
15 years 8 months ago
Image Spam Filtering Using Visual Information
We address the problem of recognizing the so-called image spam, which consists in embedding the spam message into attached images to defeat techniques based on the analysis of e-m...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...
BIS
2008
92views Business» more  BIS 2008»
15 years 4 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann