Sciweavers

1105 search results - page 186 / 221
» Timed Automata Model for Component-Based Real-Time Systems
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
NIPS
2001
13 years 10 months ago
Improvisation and Learning
This article presents a 2-phase computational learning model and application. As a demonstration, a system has been built, called CHIME for Computer Human Interacting Musical Enti...
Judy A. Franklin
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 9 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
ATAL
2008
Springer
13 years 10 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
BMVC
2002
13 years 11 months ago
Real-time gesture recognition using deterministic boosting
A gesture recognition system which can reliably recognize single-hand gestures in real time on a 600Mhz notebook computer is described. The system has a vocabulary of 46 gestures ...
Raymond Lockton, Andrew W. Fitzgibbon