Sciweavers

988 search results - page 160 / 198
» Intrusion Detection with Neural Networks
Sort
View
137
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
NETWORKING
2010
15 years 5 months ago
Bidirectional Range Extension for TCAM-Based Packet Classification
Abstract. Packet classification is a fundamental task for network devices such as edge routers, firewalls, and intrusion detection systems. Currently, most vendors use Ternary Cont...
Yan Sun, Min Sik Kim
135
Voted
ECAL
2007
Springer
15 years 5 months ago
Exogenous Fault Detection in a Collective Robotic Task
In robotics, exogenous fault detection is the process through which one robot detects faults that occur in other, physically separate robots. In this paper, we study exogenous faul...
Anders Lyhne Christensen, Rehan O'Grady, Mauro Bir...
140
Voted
ICC
2008
IEEE
130views Communications» more  ICC 2008»
15 years 10 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICASSP
2011
IEEE
14 years 7 months ago
Combining monaural source separation with Long Short-Term Memory for increased robustness in vocalist gender recognition
We present a novel and unique combination of algorithms to detect the gender of the leading vocalist in recorded popular music. Building on our previous successful approach that e...
Felix Weninger, Jean-Louis Durrieu, Florian Eyben,...