Sciweavers

8177 search results - page 97 / 1636
» Detecting System Emulators
Sort
View
GCC
2005
Springer
14 years 3 months ago
Knowledge Acquisition Based on the Global Concept of Fuzzy Cognitive Maps
Combination of prior knowledge and implicit knowledge hidden in the data of system can enhance the quality of information services in Knowledge Grid. Fuzzy Cognitive Maps (FCMs) ar...
Xiangfeng Luo
ICC
2000
IEEE
129views Communications» more  ICC 2000»
14 years 2 months ago
Control and Coordination of Interactive Videoconferencing over Hybrid Networks
−−−−This paper describes the field trial experience on the control and coordination of an interactive videoconferencing system. The system employs ATM and Internet networks...
Ting-Chao Hou, Chorng-Horng Yang, Yuan-Sun Chu, Ki...
ICCS
2004
Springer
14 years 3 months ago
Adaptive Microcalcification Detection in Computer Aided Diagnosis
Abstract. Microcalcification detection is an important part of early breast cancer detection. In this paper, we propose a microcalcification detection method in mammography CAD (co...
Ho Kyung Kang, Sung-Min Kim, Nguyen N. Thanh, Yong...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 10 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
ACSAC
2003
IEEE
14 years 3 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...