Sciweavers

198 search results - page 36 / 40
» Learning Tutorial Rules Using Classification Based On Associ...
Sort
View
ICON
2007
IEEE
14 years 3 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
IDA
2008
Springer
13 years 9 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
IJON
2007
85views more  IJON 2007»
13 years 9 months ago
Hierarchical dynamical models of motor function
Hierarchical models of motor function are described in which the motor system encodes a hierarchy of dynamical motor primitives. The models are based on continuous attractor neura...
Simon M. Stringer, Edmund T. Rolls
IJCV
2006
206views more  IJCV 2006»
13 years 9 months ago
Random Sampling for Subspace Face Recognition
Subspacefacerecognitionoftensuffersfromtwoproblems:(1)thetrainingsamplesetissmallcompared with the high dimensional feature vector; (2) the performance is sensitive to the subspace...
Xiaogang Wang, Xiaoou Tang