Sciweavers

433 search results - page 39 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
DAGM
2006
Springer
13 years 11 months ago
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels
Kernel functions as similarity measures for sequential data have been extensively studied in previous research. This contribution addresses the efficient computation of distance fu...
Konrad Rieck, Pavel Laskov, Klaus-Robert Müll...
ACMSE
2006
ACM
13 years 9 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
WACV
2007
IEEE
14 years 1 months ago
Motion Estimation Using a General Purpose Neural Network Simulator for Visual Attention
Motion detection and estimation is a first step in the much larger framework of attending to visual motion based on Selective Tuning Model of Visual Attention [1]. In order to be ...
Florentin Dorian Vintila, John K. Tsotsos
SAS
2007
Springer
126views Formal Methods» more  SAS 2007»
14 years 1 months ago
Hierarchical Pointer Analysis for Distributed Programs
We present a new pointer analysis for use in shared memory programs running on hierarchical parallel machines. The analysis is motivated by the partitioned global address space lan...
Amir Kamil, Katherine A. Yelick
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 18 days ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....