Sciweavers

329 search results - page 54 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
DSN
2011
IEEE
12 years 7 months ago
Cross-layer resilience using wearout aware design flow
—As process technology shrinks devices, circuits experience accelerated wearout. Monitoring wearout will be critical for improving the efficiency of error detection and correctio...
Bardia Zandian, Murali Annavaram
IJCNN
2008
IEEE
14 years 1 months ago
Kernel methods for fMRI pattern prediction
Abstract— In this paper, we present an effective computational approach for learning patterns of brain activity from the fMRI data. The procedure involved correcting motion artif...
Yizhao Ni, Carlton Chu, Craig J. Saunders, John As...
ICANN
2003
Springer
14 years 21 days ago
An Adaptable Gaussian Neuro-Fuzzy Classifier
The concept of semantic and context aware intelligent systems provides a vision for the Information Society where the emphasis lays on computing applications that can sense context...
Minas Pertselakis, Dimitrios S. Frossyniotis, Andr...
ESWA
2008
119views more  ESWA 2008»
13 years 7 months ago
Incremental clustering of mixed data based on distance hierarchy
Clustering is an important function in data mining. Its typical application includes the analysis of consumer's materials. Adaptive resonance theory network (ART) is very pop...
Chung-Chian Hsu, Yan-Ping Huang
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...