Sciweavers

17789 search results - page 152 / 3558
» Exceptional Use Cases
Sort
View
148
Voted
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 7 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
125
Voted
JCS
2006
91views more  JCS 2006»
15 years 3 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...
JUCS
2011
161views more  JUCS 2011»
14 years 10 months ago
Document Retrieval Using SIFT Image Features
: This paper describes a new approach to document classification based on visual features alone. Text-based retrieval systems perform poorly on noisy text. We have conducted serie...
Dan Smith, Richard Harvey
112
Voted
DSN
2007
IEEE
15 years 10 months ago
Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance
A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same in...
Vimal K. Reddy, Eric Rotenberg
125
Voted
DEXAW
2002
IEEE
99views Database» more  DEXAW 2002»
15 years 8 months ago
Using Preference Order in Ontologies
The latest ontology languages can be translated into a description logic (DL), thus providing them with a formal semantics and associated reasoning procedures. We introduce the or...
Stijn Heymans, Dirk Vermeir