Sciweavers

1159 search results - page 54 / 232
» The LINK system: MUC-4 test results and analysis
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
FORTE
2009
13 years 5 months ago
Approximated Context-Sensitive Analysis for Parameterized Verification
Abstract. We propose a verification method for parameterized systems with global conditions. The method is based on context-sensitive constraints, a symbolic representation of infi...
Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezin...
ICMCS
2006
IEEE
110views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Image Replica Detection using R-Trees and Linear Discriminant Analysis
In this paper a novel system for image replica detection is presented. The system uses color-based descriptors in order to extract robust features for image representation. These ...
Spyros Nikolopoulos, Stefanos Zafeiriou, Panagioti...
SIGPLAN
1998
13 years 7 months ago
Java and Distributed Object Models: An Analysis
Java has an important role in building distributed object oriented web enabled applications. In the article an analysis of two distributed object models in context of Java languag...
Marjan Hericko, Matjaz B. Juric, Ales Zivkovic, Iv...
ICIS
2004
13 years 9 months ago
A Factor and Structural Equation Analysis of the Enterprise Systems Success Measurement Model
Enterprise systems entail complex organizational interventions. Accurately gauging the impact of any complex information system requires understanding its multidimensionality, and...
Darshana Sedera, Guy G. Gable