Sciweavers

1036 search results - page 108 / 208
» Utilizing Validation Experience for System Validation
Sort
View
WSC
1997
13 years 9 months ago
Conduct, Misconduct, and Cargo Cult Science
I will elaborate some principles of ethical conduct in science that correspond to Richard Feynman’s wellknown precepts of “utter honesty” and “leaning over backwards” in...
James R. Wilson
APIN
2010
172views more  APIN 2010»
13 years 8 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...
TEC
2002
89views more  TEC 2002»
13 years 7 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
IEEEHPCS
2010
13 years 6 months ago
Texture feature representation in dynamic environments
This paper presents a novel approach to detect and formulate time varying changes in texture content on a sequence of images registered from a scene by using Gabor wavelets repres...
Kyeong Deok Woo, Sung Gook Kim, Sung Wook Baik
IMCSIT
2010
13 years 5 months ago
Using Self Organizing Map to Cluster Arabic Crime Documents
This paper presents a system that combines two text mining techniques; information extraction and clustering. A rulebased approach is used to perform the information extraction tas...
Meshrif Alruily, Aladdin Ayesh, Abdulsamad Al-Marg...