Sciweavers

1583 search results - page 222 / 317
» Probabilistic User Behavior Models
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
SOSP
2005
ACM
14 years 4 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...
ICCV
2003
IEEE
14 years 9 months ago
Recognising Panoramas
The problem considered in this paper is the fully automatic construction of panoramas. Fundamentally, this problem requires recognition, as we need to know which parts of the pano...
Matthew Brown, David G. Lowe
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 8 months ago
Effective Phrase Prediction
Autocompletion is a widely deployed facility in systems that require user input. Having the system complete a partially typed "word" can save user time and effort. In th...
Arnab Nandi, H. V. Jagadish
GLOBECOM
2007
IEEE
14 years 2 months ago
Non-Cooperative Dynamic Spectrum Access for CDMA Networks
— Recent studies indicate the presence of a significant amount of idle licensed spectrum, in different time periods and geographic locations. Prompted by the latest regulatory ch...
George Alyfantis, Giannis F. Marias, Stathes Hadji...