Sciweavers

2874 search results - page 513 / 575
» Intrusion Detection: Systems and Models
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 9 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
IJNM
2000
91views more  IJNM 2000»
13 years 9 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
CCS
2010
ACM
13 years 9 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
13 years 8 months ago
Robot reinforcement learning using EEG-based reward signals
Abstract— Reinforcement learning algorithms have been successfully applied in robotics to learn how to solve tasks based on reward signals obtained during task execution. These r...
Iñaki Iturrate, Luis Montesano, Javier Ming...
JEI
2010
171views more  JEI 2010»
13 years 8 months ago
Most apparent distortion: full-reference image quality assessment and the role of strategy
The mainstream approach to image quality assessment has centered around accurately modeling the single most relevant strategy employed by the human visual system (HVS) when judging...
Eric C. Larson, Damon M. Chandler