Sciweavers

2236 search results - page 350 / 448
» Intrusion detection techniques and approaches
Sort
View
POLICY
2005
Springer
14 years 2 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
CVPR
2009
IEEE
1453views Computer Vision» more  CVPR 2009»
15 years 1 months ago
Learning Photometric Invariance From Diversified Color Model Ensembles
Color is a powerful visual cue for many computer vision applications such as image segmentation and object recognition. However, most of the existing color models depend on the i...
Jose M. Alvarez, Theo Gevers, Antonio M. Lopez
INFOCOM
2006
IEEE
14 years 3 months ago
Scalable Clustering of Internet Paths by Shared Congestion
— Internet paths sharing the same bottleneck can be identified using several shared congestion detection techniques. However, all of these techniques have been designed to detec...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
BMCBI
2007
135views more  BMCBI 2007»
13 years 9 months ago
LIMPIC: a computational method for the separation of protein MALDI-TOF-MS signals from noise
Background: Mass spectrometry protein profiling is a promising tool for biomarker discovery in clinical proteomics. However, the development of a reliable approach for the separat...
Dante Mantini, Francesca Petrucci, Damiana Pierago...
CP
2009
Springer
14 years 9 months ago
Generating Optimal Stowage Plans for Container Vessel Bays
Millions of containers are stowed every week with goods worth billions of dollars, but container vessel stowage is an all but neglected combinatorial optimization problem. In this ...
Alberto Delgado, Christian Schulte, Rune Mø...