Sciweavers

2131 search results - page 21 / 427
» Immunity for Closed Sets
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 2 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
CIARP
2008
Springer
14 years 27 days ago
Measuring the Related Properties of Linearity and Elongation of Point Sets
The concept of elongation is generally well understood. However, there is no clear, precise, mathematical definition of elongation in any dictionary we could find. We propose that ...
Milos Stojmenovic, Amiya Nayak
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 11 months ago
Binding bigraphs as symmetric monoidal closed theories
Milner's bigraphs [1] are a general framework for reasoning about distributed and concurrent programming languages. Notably, it has been designed to encompass both the -calcul...
Tom Hirschowitz, Aurélien Pardon
RIAO
2004
14 years 8 days ago
Improving the Precision of a Closed-Domain Question-Answering System with Semantic Information
This paper presents our experiments in applying semantic information to improve the precision of the information retrieval module in a closed-domain question-answering system. Tha...
Hai Doan-Nguyen, Leila Kosseim
DM
2007
68views more  DM 2007»
13 years 11 months ago
Extension of Arrow's theorem to symmetric sets of tournaments
Arrow’s impossibility theorem [1] shows that the set of acyclic tournaments is not closed to non dictatorial Boolean aggregation. In this paper we extend the notion of aggregati...
Eyal Beigman