Sciweavers

568 search results - page 87 / 114
» Regular Polygon Detection
Sort
View
AIIA
2005
Springer
14 years 28 days ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta
GECCO
2010
Springer
194views Optimization» more  GECCO 2010»
14 years 6 days ago
Fitting multi-planet transit models to photometric time-data series by evolution strategies
In this paper we present the application of an evolution strategy to the problem of detecting multi-planet transit events in photometric time-data series. Planetary transits occur...
Andreas M. Chwatal, Günther R. Raidl, Michael...
CCS
2006
ACM
13 years 11 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
CIMCA
2006
IEEE
13 years 11 months ago
An Improvement in Sugeno-Yasukawa Modeler
Structure identification is one of the most significant steps in Fuzzy modeling of a complex system. Efficient structure identification requires good approximation of the effectiv...
Amir Hossein Hadad, Saeed Shiry Ghidary, Saeed Bag...
CISIS
2008
IEEE
13 years 9 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...