Sciweavers

2236 search results - page 398 / 448
» Intrusion detection techniques and approaches
Sort
View
NC
1998
143views Neural Networks» more  NC 1998»
13 years 10 months ago
Spotting Arabic Phonetic Features Using Modular Connectionist Architectures and a Rule-Based System
This paper reports the results of experiments in complex Arabic phonetic features identification using a rulebased system (SARPH) and modular connectionist architectures. The firs...
Sid-Ahmed Selouani, Jean Caelen
ISMB
1993
13 years 10 months ago
Computationally Efficient Cluster Representation in Molecular Sequence Megaclassification
Molecular sequence megaclassification is a technique for automated protein sequence analysis and annotation. Implementation of the method has been limited by the need to store and...
David J. States, Nomi L. Harris, Lawrence Hunter
GLVLSI
2008
IEEE
150views VLSI» more  GLVLSI 2008»
13 years 9 months ago
Using unsatisfiable cores to debug multiple design errors
Due to the increasing complexity of today's circuits a high degree of automation in the design process is mandatory. The detection of faults and design errors is supported qu...
André Sülflow, Görschwin Fey, Rod...
IJCV
2007
134views more  IJCV 2007»
13 years 9 months ago
Multi-sensory and Multi-modal Fusion for Sentient Computing
This paper presents an approach to multi-sensory and multi-modal fusion in which computer vision information obtained from calibrated cameras is integrated with a large-scale sent...
Christopher Town
SP
2008
IEEE
13 years 9 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight