Sciweavers

799 search results - page 96 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IPSN
2003
Springer
14 years 1 months ago
Boundary Estimation in Sensor Networks: Theory and Methods
Sensor networks have emerged as a fundamentally new tool for monitoring spatially distributed phenomena. This paper investigates a strategy by which sensor nodes detect and estima...
Robert Nowak, Urbashi Mitra
ICMCS
2005
IEEE
151views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Face and Eye Rectification in Video Conference Using Artificial Neural Network
The lack of eye contact in video conference degrades the user’s experience. This problem has been known and studied for many years. There are hardware-based solutions to the eye...
Ben Yip
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 7 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun
CCS
2010
ACM
13 years 8 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
WEBI
2009
Springer
14 years 2 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li