Sciweavers

1291 search results - page 181 / 259
» Intrusion Detection for Distributed Applications
Sort
View
COGSR
2011
105views more  COGSR 2011»
13 years 3 months ago
Inductive rule learning on the knowledge level
We present an application of the analytical inductive programming system Igor to learning sets of recursive rules from positive experience. We propose that this approach can be us...
Ute Schmid, Emanuel Kitzelmann
ICPR
2006
IEEE
14 years 10 months ago
Linear model combining by optimizing the Area under the ROC curve
In some classification problems, like the detection of illnesses in patients, classes are very unbalanced and the misclassification costs for different classes vary significantly....
David M. J. Tax, Robert P. W. Duin
ICASSP
2009
IEEE
14 years 3 months ago
Rate efficient remote video file synchronization
Video file synchronization between remote users is an important task in many applications. Re-transmission of a video that has been only slightly modified is expensive, wasteful...
Hao Zhang, Chuohao Yeo, Kannan Ramchandran
ENTCS
2008
88views more  ENTCS 2008»
13 years 8 months ago
Specification of Conditions for Error Diagnostics
This paper describes the basic concepts of error diagnostics and an associated rule system whose application helps to identify potential hardware/software locations of errors whic...
Christof Efkemann, Tobias Hartmann
JSA
2007
89views more  JSA 2007»
13 years 8 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...