Sciweavers

496 search results - page 70 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
SOFSEM
2000
Springer
13 years 11 months ago
Hierarchies of Sensing and Control in Visually Guided Agents
The capability of perceiving the environment is crucial for advancing the level of autonomy and sophistication of (semi)autonomous robotic systems and determines the complexity of ...
Jana Kosecka
ACSAC
2002
IEEE
14 years 27 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
AGI
2011
12 years 11 months ago
Imprecise Probability as a Linking Mechanism between Deep Learning, Symbolic Cognition and Local Feature Detection in Vision Pro
A novel approach to computer vision is outlined, involving the use of imprecise probabilities to connect a deep learning based hierarchical vision system with both local feature de...
Ben Goertzel
MOBISYS
2006
ACM
14 years 7 months ago
ARIADNE: a dynamic indoor signal map construction and localization system
Location determination of mobile users within a building has attracted much attention lately due to its many applications in mobile networking including network intrusion detectio...
Yiming Ji, Saad Biaz, Santosh Pandey, Prathima Agr...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...