Sciweavers

1090 search results - page 185 / 218
» A Replicated Monitoring Tool
Sort
View
IMC
2007
ACM
13 years 10 months ago
Using uncleanliness to predict future botnet addresses
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations...
M. Patrick Collins, Timothy J. Shimeall, Sidney Fa...
DIMVA
2007
13 years 10 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
LREC
2010
143views Education» more  LREC 2010»
13 years 10 months ago
Language Service Management with the Language Grid
As the number of language resources accessible on the Internet increases, many efforts have been made for combining language resources and language processing tools to create new ...
Yohei Murakami, Donghui Lin, Masahiro Tanaka, Taka...
LREC
2008
114views Education» more  LREC 2008»
13 years 10 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...
AVI
2004
13 years 10 months ago
Observing and adapting user behavior in navigational 3D interfaces
In a navigation-oriented interaction paradigm, such as desktop, mixed and augmented virtual reality, recognizing the user needs is a valuable improvement, provided that the system...
Augusto Celentano, Fabio Pittarello