Sciweavers

733 search results - page 145 / 147
» Active Automation of the DITSCAP
Sort
View
VIZSEC
2004
Springer
14 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
CSB
2003
IEEE
176views Bioinformatics» more  CSB 2003»
14 years 3 months ago
3D Structural Homology Detection via Unassigned Residual Dipolar Couplings
Recognition of a protein’s fold provides valuable information about its function. While many sequence-based homology prediction methods exist, an important challenge remains: tw...
Christopher James Langmead, Bruce Randall Donald
MIR
2003
ACM
178views Multimedia» more  MIR 2003»
14 years 3 months ago
A bootstrapping approach to annotating large image collection
Huge amount of manual efforts are required to annotate large image/video archives with text annotations. Several recent works attempted to automate this task by employing supervis...
HuaMin Feng, Tat-Seng Chua
SAC
2003
ACM
14 years 3 months ago
iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System
Emerging Smart phones are poised to give a whole new dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant...
Sangeetha Shekar, Prashant Nair, Abdelsalam Helal
SIGCOMM
2003
ACM
14 years 3 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...