Sciweavers

386 search results - page 33 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
13 years 8 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
14 years 11 days ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
AAAI
2011
12 years 8 months ago
Linear Dynamic Programs for Resource Management
Sustainable resource management in many domains presents large continuous stochastic optimization problems, which can often be modeled as Markov decision processes (MDPs). To solv...
Marek Petrik, Shlomo Zilberstein
IQ
2007
13 years 10 months ago
An Alert Management Approach To Data Quality: Lessons Learned From The Visa Data Authority Program
: We introduce an end-to-end framework for data quality that integrates business strategy, data quality models, and supporting investigative and governance processes. We also descr...
Joseph Bugajski, Robert L. Grossman