Sciweavers

1315 search results - page 97 / 263
» Discovering significant rules
Sort
View
LISA
2007
15 years 6 months ago
PolicyVis: Firewall Security Policy Visualization and Inspection
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Tung Tran, Ehab S. Al-Shaer, Raouf Boutaba
WSC
2000
15 years 5 months ago
Scheduling MEMS manufacturing
This paper focuses on the production scheduling in MEMS (Micro-Electro Mechanical System) manufacturing. The whole MEMS production process can be organized into 3 sub-processes, i...
Wang Lixin, Francis Eng Hock Tay, Loo Hay Lee
SAC
2004
ACM
15 years 10 months ago
Guiding motif discovery by iterative pattern refinement
In this paper, we demonstrate that the performance of a motif discovery algorithm can be significantly improved by embedding it into a novel framework that effectively guides the ...
Zhiping Wang, Mehmet M. Dalkilic, Sun Kim
133
Voted
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 11 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ICML
2008
IEEE
16 years 5 months ago
Automatic discovery and transfer of MAXQ hierarchies
We present an algorithm, HI-MAT (Hierarchy Induction via Models And Trajectories), that discovers MAXQ task hierarchies by applying dynamic Bayesian network models to a successful...
Neville Mehta, Soumya Ray, Prasad Tadepalli, Thoma...