Sciweavers

799 search results - page 77 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 2 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
14 years 2 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ...
Marek Lipczak, Evangelos E. Milios
TCOM
2008
82views more  TCOM 2008»
13 years 7 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
WASA
2009
Springer
189views Algorithms» more  WASA 2009»
14 years 2 months ago
Information Extraction as Link Prediction: Using Curated Citation Networks to Improve Gene Detection
Abstract. In this paper we explore the usefulness of various types of publicationrelated metadata, such as citation networks and curated databases, for the task of identifying gene...
Andrew Arnold, William W. Cohen
IROS
2008
IEEE
144views Robotics» more  IROS 2008»
14 years 2 months ago
Frame rate object extraction from video sequences with self organizing networks and statistical background detection
— In many computer vision related applications it is necessary to distinguish between the background of an image and the objects that are contained in it. This is a difficult pr...
Thiago C. Bellardi, Dizan Vasquez, Christian Laugi...