Sciweavers

962 search results - page 71 / 193
» Input validation analysis and testing
Sort
View
IEEEARES
2006
IEEE
14 years 4 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
FUIN
2011
358views Cryptology» more  FUIN 2011»
13 years 1 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
INFORMATICALT
2002
110views more  INFORMATICALT 2002»
13 years 10 months ago
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach
In this paper, we present our Form-driven approach for reverse engineering of relationa databases. This methodology uses the information extracted from both form structure and inst...
Mimoun Malki, André Flory, Mustapha Kamal R...
ICASSP
2011
IEEE
13 years 1 months ago
Syllabification of conversational speech using Bidirectional Long-Short-Term Memory Neural Networks
Segmentation of speech signals is a crucial task in many types of speech analysis. We present a novel approach at segmentation on a syllable level, using a Bidirectional Long-Shor...
Christian Landsiedel, Jens Edlund, Florian Eyben, ...
ICCAD
2005
IEEE
79views Hardware» more  ICCAD 2005»
14 years 7 months ago
Oscillator-AC: restoring rigour to linearized small-signal analysis of oscillators
— Standard small-signal analysis methods for circuits break down for oscillators because small input perturbations result in arbitrarily large output changes, thus invalidating f...
Ting Mei, Jaijeet S. Roychowdhury