Sciweavers

988 search results - page 160 / 198
» Intrusion Detection with Neural Networks
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
NETWORKING
2010
13 years 9 months ago
Bidirectional Range Extension for TCAM-Based Packet Classification
Abstract. Packet classification is a fundamental task for network devices such as edge routers, firewalls, and intrusion detection systems. Currently, most vendors use Ternary Cont...
Yan Sun, Min Sik Kim
ECAL
2007
Springer
13 years 9 months ago
Exogenous Fault Detection in a Collective Robotic Task
In robotics, exogenous fault detection is the process through which one robot detects faults that occur in other, physically separate robots. In this paper, we study exogenous faul...
Anders Lyhne Christensen, Rehan O'Grady, Mauro Bir...
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 2 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICASSP
2011
IEEE
12 years 11 months ago
Combining monaural source separation with Long Short-Term Memory for increased robustness in vocalist gender recognition
We present a novel and unique combination of algorithms to detect the gender of the leading vocalist in recorded popular music. Building on our previous successful approach that e...
Felix Weninger, Jean-Louis Durrieu, Florian Eyben,...