Sciweavers

988 search results - page 145 / 198
» Intrusion Detection with Neural Networks
Sort
View
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 9 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
BSN
2011
IEEE
233views Sensor Networks» more  BSN 2011»
12 years 8 months ago
Compressive Sensing of Neural Action Potentials Using a Learned Union of Supports
—Wireless neural recording systems are subject to stringent power consumption constraints to support long-term recordings and to allow for implantation inside the brain. In this ...
Zainul Charbiwala, Vaibhav Karkare, Sarah Gibson, ...
TIP
2008
344views more  TIP 2008»
13 years 8 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
ICONIP
2008
13 years 9 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
AHS
2007
IEEE
269views Hardware» more  AHS 2007»
14 years 2 months ago
Automatic Synthesis of Fault Detection Modules for Mobile Robots
In this paper, we present a new approach for automatic synthesis of fault detection modules for autonomous mobile robots. The method relies on the fact that hardware faults typica...
Anders Lyhne Christensen, Rehan O'Grady, Mauro Bir...