Sciweavers

329 search results - page 57 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
ICMLA
2010
13 years 5 months ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
IJAIT
2006
121views more  IJAIT 2006»
13 years 7 months ago
An Efficient Feature Selection Algorithm for Computer-aided Polyp Detection
We present an efficient feature selection algorithm for computer aided detection (CAD) computed tomographic (CT) colonography. The algorithm 1) determines an appropriate piecewise...
Jiang Li, Jianhua Yao, Ronald M. Summers, Nicholas...
NETWORKING
2004
13 years 8 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...
AINA
2010
IEEE
14 years 17 days ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...