Sciweavers

861 search results - page 128 / 173
» Towards feature selection in network
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
13 years 9 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
TRIDENTCOM
2010
IEEE
13 years 9 months ago
Experimental Evaluation of OpenVZ from a Testbed Deployment Perspective
A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means o...
Gautam D. Bhanage, Ivan Seskar, Yanyong Zhang, Dip...
COMPSYSTECH
2009
13 years 8 months ago
A Bayesian approach to recognise facial expressions using vector flows
: Facial expressions play an important role in human nonverbal communication. They can be generated by activation and dilatation of facial muscles. In this paper we describe a syst...
Xiaofan Sun, Léon J. M. Rothkrantz, Dragos ...
WWW
2006
ACM
14 years 11 months ago
Position paper: ontology construction from online ontologies
One of the main hurdles towards a wide endorsement of ontologies is the high cost of constructing them. Reuse of existing ontologies offers a much cheaper alternative than buildin...
Harith Alani
IWIA
2005
IEEE
14 years 4 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...