Sciweavers

666 search results - page 12 / 134
» When Similar Problems Don't Have Similar Solutions
Sort
View
ISSA
2004
13 years 10 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 29 days ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao
JMLR
2006
108views more  JMLR 2006»
13 years 8 months ago
Learning Spectral Clustering, With Application To Speech Separation
Spectral clustering refers to a class of techniques which rely on the eigenstructure of a similarity matrix to partition points into disjoint clusters, with points in the same clu...
Francis R. Bach, Michael I. Jordan
ECSCW
2007
13 years 10 months ago
Behaviours and Preferences when Coordinating Mediated Interruptions: Social and System influence
Abstract. There is a growing interest in technologies for supporting individuals to manage their accessibility for interruptions. The applicability of these technologies is likely ...
Natalia A. Romero, Agnieszka Matysiak Szóst...
EH
2003
IEEE
100views Hardware» more  EH 2003»
14 years 2 months ago
Learning for Evolutionary Design
This paper describes a technique for evolving similar solutions to similar configuration design problems. Using the configuration design of combination logic circuits as a testb...
Sushil J. Louis