Sciweavers

425 search results - page 83 / 85
» Audit
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Probabilistic annotation of protein sequences based on functional classifications
: One of the most evident achievements of bioinformatics is the development of methods that transfer biological knowledge from characterised proteins to uncharacterised sequences. ...
Emmanuel D. Levy, Christos A. Ouzounis, Walter R. ...
CN
2000
95views more  CN 2000»
13 years 7 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
TIT
2002
96views more  TIT 2002»
13 years 7 months ago
Wavelet-based estimators of scaling behavior
Various wavelet-based estimators of self-similarity or long-range dependence scaling exponent are studied extensively. These estimators mainly include the (bi)orthogonal wavelet e...
Benjamin Audit, E. Bacry, J.-F. Muzy, Alain Arneod...
TMM
2002
130views more  TMM 2002»
13 years 7 months ago
Computable scenes and structures in films
In this paper, we present a computational scene model and also derive novel algorithms for computing audio and visual scenes and within-scene structures in films. We use constraint...
Hari Sundaram, Shih-Fu Chang