Sciweavers

496 search results - page 82 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
TWC
2010
13 years 2 months ago
A Novel Graph-Based Suboptimal Multiuser Detector for FDM-CPM Transmissions
We consider a frequency division multiplexed (FDM) system where each user employs a continuous phase modulation (CPM), serially concatenated with an outer code through an interleav...
Amina Piemontese, Giulio Colavolpe
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
AIIA
2007
Springer
13 years 9 months ago
Tonal Harmony Analysis: A Supervised Sequential Learning Approach
We have recently presented CarpeDiem, an algorithm that can be used for speeding up the evaluation of Supervised Sequential Learning (SSL) classifiers. CarpeDiem provides impress...
Daniele P. Radicioni, Roberto Esposito
ANCS
2007
ACM
13 years 12 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
CVPR
2007
IEEE
14 years 10 months ago
Learning Dynamic Event Descriptions in Image Sequences
Automatic detection of dynamic events in video sequences has a variety of applications including visual surveillance and monitoring, video highlight extraction, intelligent transp...
Harini Veeraraghavan, Nikolaos Papanikolopoulos, P...