Sciweavers

1105 search results - page 186 / 221
» Timed Automata Model for Component-Based Real-Time Systems
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 8 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
112
Voted
NIPS
2001
15 years 4 months ago
Improvisation and Learning
This article presents a 2-phase computational learning model and application. As a demonstration, a system has been built, called CHIME for Computer Human Interacting Musical Enti...
Judy A. Franklin
105
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 3 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
ATAL
2008
Springer
15 years 4 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
121
Voted
BMVC
2002
15 years 5 months ago
Real-time gesture recognition using deterministic boosting
A gesture recognition system which can reliably recognize single-hand gestures in real time on a 600Mhz notebook computer is described. The system has a vocabulary of 46 gestures ...
Raymond Lockton, Andrew W. Fitzgibbon