Sciweavers

8177 search results - page 129 / 1636
» Detecting System Emulators
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
RAID
1999
Springer
14 years 2 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
VLDB
2005
ACM
87views Database» more  VLDB 2005»
14 years 3 months ago
NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems
In this demo, we present Nile-PDT, a Phenomenon Detection and Tracking framework using the Nile data stream management system. A phenomenon is characterized by a group of streams ...
Mohamed H. Ali, Walid G. Aref, Raja Bose, Ahmed K....
DAS
2010
Springer
14 years 3 months ago
A system to detect rooms in architectural floor plan images
In this article, a system to detect the rooms in architectural floor plan images is described. We first present a primitive extraction algorithm for line detection. It is based ...
Sébastien Macé, Hervé Locteau...
INTELLCOMM
2004
Springer
14 years 3 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...