Sciweavers

109 search results - page 11 / 22
» Meta-Typicalness Approach to Reliable Classification
Sort
View
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
BMCBI
2006
74views more  BMCBI 2006»
13 years 8 months ago
An unsupervised classification scheme for improving predictions of prokaryotic TIS
Background: Although it is not difficult for state-of-the-art gene finders to identify coding regions in prokaryotic genomes, exact prediction of the corresponding translation ini...
Maike Tech, Peter Meinicke
CLEF
2008
Springer
13 years 10 months ago
Methods for Combining Content-Based and Textual-Based Approaches in Medical Image Retrieval
This paper describes our participation in the Medical Image Retrieval task of Image CLEF 2008. Our aim was to evaluate different combination methods for purely textual and visual ...
Mouna Torjmen, Karen Pinel-Sauvagnat, Mohand Bough...
JUCS
2008
160views more  JUCS 2008»
13 years 8 months ago
Automatic Construction of Fuzzy Rule Bases: a further Investigation into two Alternative Inductive Approaches
: The definition of the Fuzzy Rule Base is one of the most important and difficult tasks when designing Fuzzy Systems. This paper discusses the results of two different hybrid meth...
Marcos Evandro Cintra, Heloisa de Arruda Camargo, ...
CN
2004
256views more  CN 2004»
13 years 8 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...