Sciweavers

164 search results - page 20 / 33
» Application Intrusion Detection using Language Library Calls
Sort
View
EKAW
1992
Springer
13 years 11 months ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
ICPR
2008
IEEE
14 years 8 months ago
Generic scale-space process for handwriting documents analysis
This paper presents a generic architecture for handwriting documents analysis. It covers all analysis steps from the content description of the document (layout analysis, handwrit...
Guillaume Joutel, Hubert Emptoz, Véronique ...
BMCBI
2008
104views more  BMCBI 2008»
13 years 7 months ago
ReRep: Computational detection of repetitive sequences in genome survey sequences (GSS)
Background: Genome survey sequences (GSS) offer a preliminary global view of a genome since, unlike ESTs, they cover coding as well as non-coding DNA and include repetitive region...
Thomas D. Otto, Leonardo H. F. Gomes, Marcelo Alve...
GLOBECOM
2010
IEEE
13 years 4 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
14 years 8 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang