Sciweavers

2236 search results - page 349 / 448
» Intrusion detection techniques and approaches
Sort
View
ICASSP
2011
IEEE
13 years 28 days ago
Feature selection through gravitational search algorithm
In this paper we deal with the problem of feature selection by introducing a new approach based on Gravitational Search Algorithm (GSA). The proposed algorithm combines the optimi...
João Paulo Papa, Andre Pagnin, Silvana Arti...
ICASSP
2011
IEEE
13 years 28 days ago
Binaural sound source separation motivated by auditory processing
In this paper we present a new method of signal processing for robust speech recognition using two microphones. The method, loosely based on the human binaural hearing system, con...
Chanwoo Kim, Kshitiz Kumar, Richard M. Stern
SAC
2011
ACM
13 years 1 days ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
WLP
2007
Springer
14 years 3 months ago
spock: A Debugging Support Tool for Logic Programs under the Answer-Set Semantics
Answer-set programming (ASP) is an emerging logic-programming paradigm that strictly separates the description of a problem from its solving methods. Despite its semantic elegance,...
Martin Gebser, Jörg Pührer, Torsten Scha...
OSDI
2004
ACM
14 years 9 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...