Sciweavers

496 search results - page 88 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
COMPUTER
2004
179views more  COMPUTER 2004»
13 years 7 months ago
Environmental Sensor Networks
Environmental Sensor Networks (ESNs) facilitate the study of fundamental processes and the development of hazard response systems. They have evolved from passive logging systems t...
Kirk Martinez, Jane K. Hart, Royan Ong
CCS
2010
ACM
13 years 8 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
EVOW
2006
Springer
13 years 11 months ago
Artificial Life Models in Lung CTs
A new method for the analysis of 3D medical images is introduced. The algorithm is based on Biological Models of ants known as Artificial Life models. Test images (lung Computed To...
Sorin Cristian Cheran, Gianfranco Gargano
JFP
2000
163views more  JFP 2000»
13 years 7 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
CONNECTION
2006
172views more  CONNECTION 2006»
13 years 8 months ago
Temporal sequence detection with spiking neurons: towards recognizing robot language instructions
We present an approach for recognition and clustering of spatio temporal patterns based on networks of spiking neurons with active dendrites and dynamic synapses. We introduce a n...
Christo Panchev, Stefan Wermter