Sciweavers

496 search results - page 61 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
TSP
2010
13 years 2 months ago
Adaptive precoding for downstream crosstalk precancelation in DSL systems using sign-error feedback
The performance of many very high bit rate digital subscriber line (VDSL) systems is limited by the effects of crosstalk among the wires in a bundle. For the downstream, a precoder...
Jérôme Louveaux, Alle-Jan van der Vee...
FLAIRS
2004
13 years 9 months ago
Augmenting AI Coursework Through Undergraduate Research
All courses in Artificial Intelligence are not equal. The topics covered by a course entitled Artificial Intelligence vary widely. The Computing Curricula 2001: Computer Science o...
Antonio M. Lopez Jr.
CLUSTER
2004
IEEE
13 years 11 months ago
Towards informatic analysis of Syslogs
The complexity and cost of isolating the root cause of system problems in large parallel computers generally scales with the size of the system. Syslog messages provide a primary ...
John Stearley
GRC
2007
IEEE
14 years 2 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu