Sciweavers

481 search results - page 44 / 97
» Some Problems in Sanitizing Network Data
Sort
View
CVPR
1999
IEEE
14 years 10 months ago
Vision-Based Speaker Detection Using Bayesian Networks
The development of user interfaces based on vision and speech requires the solution of a challenging statistical inference problem: The intentions and actions of multiple individu...
James M. Rehg, Kevin P. Murphy, Paul W. Fieguth
ICEIS
2008
IEEE
14 years 3 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
GI
2004
Springer
14 years 2 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics ā€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
ICANN
2005
Springer
14 years 2 months ago
Principles of Employing a Self-organizing Map as a Frequent Itemset Miner
This work proposes a theoretical guideline in the speciļ¬c area of Frequent Itemset Mining (FIM). It supports the hypothesis that the use of neural network technology for the prob...
Vicente O. Baez-Monroy, Simon O'Keefe
NETWORKING
2004
13 years 10 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...