Sciweavers

8249 search results - page 1441 / 1650
» The DBO database system
Sort
View
DFN
2009
15 years 5 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
ICASSP
2010
IEEE
15 years 4 months ago
Using cross-decoder phone coocurrences in phonotactic language recognition
Phonotactic language recognizers are based on the ability of phone decoders to produce phone sequences containing acoustic, phonetic and phonological information, which is partial...
Mikel Peñagarikano, Amparo Varona, Luis Jav...
CORR
2010
Springer
214views Education» more  CORR 2010»
15 years 4 months ago
Hybrid Medical Image Classification Using Association Rule Mining with Decision Tree Algorithm
The main focus of image mining in the proposed method is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: p...
P. Rajendran, M. Madheswaran
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 4 months ago
ElasTraS: An Elastic Transactional Data Store in the Cloud
Over the last couple of years, "Cloud Computing" or "Elastic Computing" has emerged as a compelling and successful paradigm for internet scale computing. One o...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
IANDC
2008
128views more  IANDC 2008»
15 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
« Prev « First page 1441 / 1650 Last » Next »