Sciweavers

357 search results - page 57 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
LISA
2008
13 years 10 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
ISDA
2009
IEEE
14 years 2 months ago
GPU-Based Road Sign Detection Using Particle Swarm Optimization
—Road Sign Detection is a major goal of Advanced Driving Assistance Systems (ADAS). Since the dawn of this discipline, much work based on different techniques has been published ...
Luca Mussi, Stefano Cagnoni, Fabio Daolio
ICDM
2007
IEEE
196views Data Mining» more  ICDM 2007»
14 years 2 months ago
Diagnosing Similarity of Oscillation Trends in Time Series
Sensor networks have increased the amount and variety of temporal data available, requiring the definition of new techniques for data mining. Related research typically addresses...
Leonardo E. Mariote, Claudia Bauzer Medeiros, Rica...
WS
2006
ACM
14 years 1 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
CVPR
2009
IEEE
15 years 3 months ago
Topology Dictionary with Markov Model for 3D Video Content-Based Skimming and Description
This paper presents a novel approach to skim and describe 3D videos. 3D video is an imaging technology which consists in a stream of 3D models in motion captured by a synchronized ...
Tony Tung (Kyoto University), Takashi Matsuyama (K...