Sciweavers

496 search results - page 68 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
MM
2006
ACM
330views Multimedia» more  MM 2006»
14 years 1 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah
ATAL
2009
Springer
14 years 2 months ago
Inconsistency tolerance in weighted argument systems
We introduce and investigate a natural extension of Dung’s well-known model of argument systems in which attacks are associated with a weight, indicating the relative strength o...
Paul E. Dunne, Anthony Hunter, Peter McBurney, Sim...
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
13 years 11 months ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger
FLAIRS
2010
13 years 6 months ago
Using Ontologies in Case-Based Activity Recognition
Pervasive computing requires the ability to detect user activity in order to provide situation-specific services. Case-based reasoning can be used for activity recognition by usin...
Stephen Knox, Lorcan Coyle, Simon Dobson
DAC
2007
ACM
14 years 9 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo