Sciweavers

10435 search results - page 50 / 2087
» Measuring system normality
Sort
View
CLEF
2011
Springer
12 years 8 months ago
Intrinsic Plagiarism Detection Using Character Trigram Distance Scores - Notebook for PAN at CLEF 2011
Abstract In this paper, we describe a novel approach to intrinsic plagiarism detection. Each suspicious document is divided into a series of consecutive, potentially overlapping ā€...
Mike Kestemont, Kim Luyckx, Walter Daelemans
AUSAI
2003
Springer
14 years 2 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modiļ¬cation of impor...
Sang-Jun Han, Sung-Bae Cho
JSW
2007
138views more  JSW 2007»
13 years 8 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
ā€” The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
VTC
2008
IEEE
125views Communications» more  VTC 2008»
14 years 3 months ago
A General Formula for Log-MGF Computation: Application to the Approximation of Log-Normal Power Sum via Pearson Type IV Distribu
Abstractā€” In [1], we have recently proposed a general approach for approximating the power sum of Logā€“Normal Random Variables (RVs) by using the Pearson system of distributions...
Marco Di Renzo, Fabio Graziosi, Fortunato Santucci
WFLP
2000
Springer
82views Algorithms» more  WFLP 2000»
14 years 10 days ago
Strong and NV-sequentiality of constructor systems
Constructor Systems (CSs) are an important subclass of Term Rewriting Systems (TRSs) which can be used stract model of some programming languages. While normalizing strategies are...
Salvador Lucas