Sciweavers

796 search results - page 33 / 160
» Spoofing prevention method
Sort
View
ESANN
2001
13 years 11 months ago
Some known facts about financial data
: Many researchers are interesting in applying the neural networks methods to financial data. In fact these data are very complex, and classical methods do not always give satisfac...
Eric de Bodt, Joseph Rynkiewicz, Marie Cottrell
PTS
2007
120views Hardware» more  PTS 2007»
13 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
DCC
2005
IEEE
14 years 9 months ago
Lossless Data Compression Using Optimal Tree Machines
We discuss a lossless data compression system that uses fixed Tree Machines to encode data. The idea is to create a sequence of Tree Machines and a robust escape method aimed at p...
Gergely Korodi, Jorma Rissanen, Ioan Tabus
ICSE
2003
IEEE-ACM
14 years 3 months ago
Tool Support for Scenario-Based Architecture Evaluation
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Steffen Thiel, Andreas Hein, Heiner Engelhardt
SSDBM
2002
IEEE
100views Database» more  SSDBM 2002»
14 years 2 months ago
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
Josep Domingo-Ferrer, Anna Oganian, Vicenç ...