Sciweavers

2241 search results - page 147 / 449
» Performance Modeling and Evaluation of E-Business Systems
Sort
View
APNOMS
2008
Springer
13 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
MTA
2007
183views more  MTA 2007»
13 years 8 months ago
The design of a wireless real-time visual surveillance system
In this paper, we study the important issues in the design of an efficient WIreless real-time visual SurveillancE System (WISES). Two important considerations are to minimize: (1)...
Kam-yiu Lam, Calvin K. H. Chiu
CIKM
2011
Springer
12 years 9 months ago
Ranking-based processing of SQL queries
A growing number of applications are built on top of search engines and issue complex structured queries. This paper contributes a customisable ranking-based processing of such qu...
Hany Azzam, Thomas Roelleke, Sirvan Yahyaei
ESORICS
2006
Springer
14 years 23 days ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
ICASSP
2011
IEEE
13 years 25 days ago
Eigentriphones: A basis for context-dependent acoustic modeling
In context-dependent acoustic modeling, it is important to strike a balance between detailed modeling and data sufficiency for robust estimation of model parameters. In the past,...
Tom Ko, Brian Mak