Sciweavers

15375 search results - page 311 / 3075
» cans 2008
Sort
View
CNSR
2008
IEEE
169views Communications» more  CNSR 2008»
15 years 11 months ago
Critical Episode Mining in Intrusion Detection Alerts
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
Mahboobeh Soleimani, Ali A. Ghorbani
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 11 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin
ICML
2008
IEEE
16 years 5 months ago
Extracting and composing robust features with denoising autoencoders
Previous work has shown that the difficulties in learning deep generative or discriminative models can be overcome by an initial unsupervised learning step that maps inputs to use...
Pascal Vincent, Hugo Larochelle, Yoshua Bengio, Pi...
CIMCA
2008
IEEE
15 years 11 months ago
The C++ Hybrid Imperative Meta-Programmer: CHIMP
Neither the C nor the C++ languages support reflection and their meta-programming capabilities are very limited. Both of these problems can be addressed by adding a preprocessing...
John Kenyon, Frederick C. Harris Jr., Sergiu M. Da...
GLOBECOM
2008
IEEE
15 years 11 months ago
Cross-Layer Cooperative Triple Busy Tone Multiple Access for Wireless Networks
—In this paper, with the cross-layer design principle, a novel cooperative triple busy tone multiple access (CTBTMA) scheme is proposed for wireless networks to achieve cooperati...
Hangguan Shan, Ping Wang, Weihua Zhuang, Zongxin W...