Sciweavers

988 search results - page 189 / 198
» Intrusion Detection with Neural Networks
Sort
View
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
NN
2004
Springer
102views Neural Networks» more  NN 2004»
14 years 1 months ago
A Quantitative Evaluation of a Bio-inspired Sound Segregation Technique for Two- and Three-Source Mixtures
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
Ramin Pichevar, Jean Rouat
IJCNN
2006
IEEE
14 years 1 months ago
Comparing Kernels for Predicting Protein Binding Sites from Amino Acid Sequence
— The ability to identify protein binding sites and to detect specific amino acid residues that contribute to the specificity and affinity of protein interactions has importan...
Feihong Wu
NIPS
1996
13 years 9 months ago
Early Stopping-But When?
Abstract. Validation can be used to detect when over tting starts during supervised training of a neural network; training is then stopped before convergence to avoid the over ttin...
Lutz Prechelt
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...