Sciweavers

112 search results - page 15 / 23
» Trained to accept
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 8 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
PERCOM
2007
ACM
14 years 7 months ago
MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity
We envisage pervasive computing applications to be predominantly engaged in knowledge-based interactions, where services and information will be found and exchanged based on some ...
Licia Capra
WEA
2009
Springer
103views Algorithms» more  WEA 2009»
14 years 2 months ago
Pareto Paths with SHARC
Abstract. Up to now, research on speed-up techniques for DIJKSTRA’s algorithm focused on single-criteria scenarios. The goal was to find the quickest route within a transportati...
Daniel Delling, Dorothea Wagner
CEC
2008
IEEE
14 years 2 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 1 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa