Sciweavers

329 search results - page 44 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
IJISTA
2010
100views more  IJISTA 2010»
13 years 6 months ago
Development of an awakening detection system with the NN and adaptation for fluctuation of brightness quantity in the captured i
Recently, accidents such that seniors fall down from the bed in care facilities or hospitals are increased. To prevent these accidents, we have developed an awakening detection sys...
Nobuhisa Yamanaka, Hironobu Satoh, Fumiaki Takeda
CCS
2006
ACM
13 years 11 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
DSN
2008
IEEE
14 years 2 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
ACML
2009
Springer
14 years 2 months ago
Community Detection on Weighted Networks: A Variational Bayesian Method
Abstract. Massive real-world data are network-structured, such as social network, relationship between proteins and power grid. Discovering the latent communities is a useful way f...
Qixia Jiang, Yan Zhang, Maosong Sun
ICDCS
2007
IEEE
14 years 1 months ago
STEP: Sequentiality and Thrashing Detection Based Prefetching to Improve Performance of Networked Storage Servers
State-of-the-art networked storage servers are equipped with increasingly powerful computing capability and large DRAM memory as storage caches. However, their contribution to the...
Shuang Liang, Song Jiang, Xiaodong Zhang