Sciweavers

474 search results - page 56 / 95
» Empirical Evaluation of Techniques for Measuring Available B...
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
ICMCS
2005
IEEE
97views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Standard Compatible Error Correction for Multimedia Transmissions Over 802.11 WLAN
In this paper, we analyze a standard compatible error correction technique for multimedia transmissions over 802.11 WLANs that exploits, when available, the information of previou...
Enrico Masala, Antonio Servetti, Juan Carlos De Ma...
IWCMC
2010
ACM
14 years 18 days ago
On the use of random neural networks for traffic matrix estimation in large-scale IP networks
Despite a large body of literature and methods devoted to the Traffic Matrix (TM) estimation problem, the inference of traffic flows volume from aggregated data still represents a ...
Pedro Casas, Sandrine Vaton
EMMCVPR
2011
Springer
12 years 10 months ago
Optimization of Robust Loss Functions for Weakly-Labeled Image Taxonomies: An ImageNet Case Study
The recently proposed ImageNet dataset consists of several million images, each annotated with a single object category. However, these annotations may be imperfect, in the sense t...
Julian John McAuley, Arnau Ramisa, Tibério ...
MSR
2006
ACM
14 years 4 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...