Sciweavers

112 search results - page 10 / 23
» Test of spike-sorting algorithms on the basis of simulated n...
Sort
View
ICNC
2005
Springer
14 years 28 days ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
CRITIS
2007
13 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
BMCBI
2010
176views more  BMCBI 2010»
13 years 7 months ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
AADEBUG
1997
Springer
13 years 11 months ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo
IAJIT
2011
13 years 2 months ago
Novel robust multilevel 3D visualization technique for web based GIS
: Number of recent technologies take Geographic Information Systems to new levels of power and usability. One of the most promising technologies that empower Geographic Information...
Hatem Abdul-Kader, Mohamed Sherif