Sciweavers

134 search results - page 3 / 27
» A Hybrid Approach for Accurate Application Traffic Identific...
Sort
View
BMCBI
2008
111views more  BMCBI 2008»
13 years 11 months ago
Distinguishing the species of biomedical named entities for term identification
Background: Term identification is the task of grounding ambiguous mentions of biomedical named entities in text to unique database identifiers. Previous work on term identificati...
Xinglong Wang, Michael Matthews
CNSM
2010
13 years 9 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood
JMLR
2006
113views more  JMLR 2006»
13 years 10 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
HYBRID
2001
Springer
14 years 3 months ago
Accurate Event Detection for Simulating Hybrid Systems
It has been observed that there are a variety of situations in which the most popular hybrid simulation methods can fail to properly detect the occurrence of discrete events. In th...
Joel M. Esposito, Vijay Kumar, George J. Pappas
ISCAS
2003
IEEE
134views Hardware» more  ISCAS 2003»
14 years 4 months ago
A hybrid system for automatic fingerprint identification
A hybrid fingerprint identification system is presented in this paper. The system consists of several steps: fingerprint enhancement, minutiae extraction, texture feature extracti...
Sanpachai Huvanandana, Settapong Malisuwan, Jakkap...