Sciweavers

12863 search results - page 2433 / 2573
» Dynamic Data Mining
Sort
View
145
Voted
FUIN
2006
160views more  FUIN 2006»
15 years 2 months ago
Behavioral Pattern Identification Through Rough Set Modeling
This paper introduces an approach to behavioral pattern identification as a part of a study of temporal patterns in complex dynamical systems. Rough set theory introduced by Zdzisl...
Jan G. Bazan
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 2 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
107
Voted
IJOE
2008
98views more  IJOE 2008»
15 years 2 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
107
Voted
IJSNET
2008
126views more  IJSNET 2008»
15 years 2 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
IJCV
2006
110views more  IJCV 2006»
15 years 2 months ago
Multi-body Factorization with Uncertainty: Revisiting Motion Consistency
Dynamic analysis of video sequences often relies on the segmentation of the sequence into regions of consistent motions. Approaching this problem requires a definition of which mo...
Lihi Zelnik-Manor, Moshe Machline, Michal Irani
« Prev « First page 2433 / 2573 Last » Next »