Sciweavers

2259 search results - page 89 / 452
» Separation and information hiding
Sort
View
VIIP
2001
13 years 10 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
AAAI
1994
13 years 10 months ago
Evolving Neural Networks to Focus Minimax Search
Neural networks were evolved through genetic algorithms to focus minimax search in the game of Othello. At each level of the search tree, the focus networks decide which moves are...
David E. Moriarty, Risto Miikkulainen
AAAI
1990
13 years 10 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 9 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
IJFCS
2008
98views more  IJFCS 2008»
13 years 9 months ago
On Succinct Representation of Knowledge Community Taxonomies with Formal Concept Analysis
We present an application of formal concept analysis aimed at representing a meaningful structure of knowledge communities in the form of a lattice-based taxonomy. The taxonomy gr...
Camille Roth, Sergei A. Obiedkov, Derrick G. Kouri...