Sciweavers

329 search results - page 52 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
BMCBI
2007
131views more  BMCBI 2007»
13 years 7 months ago
Prediction of peptides observable by mass spectrometry applied at the experimental set level
Background: When proteins are subjected to proteolytic digestion and analyzed by mass spectrometry using a method such as 2D LC MS/MS, only a portion of the proteotypic peptides a...
William S. Sanders, Susan M. Bridges, Fiona M. McC...
GECCO
2006
Springer
182views Optimization» more  GECCO 2006»
13 years 11 months ago
Distributed genetic algorithm for energy-efficient resource management in sensor networks
In this work we consider energy-efficient resource management in an environment monitoring and hazard detection sensor network. Our goal is to allocate different detection methods...
Qinru Qiu, Qing Wu, Daniel J. Burns, Douglas Holzh...
ICDCSW
2007
IEEE
14 years 1 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
WORM
2004
13 years 8 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
INFOCOM
2010
IEEE
13 years 5 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao