Sciweavers

458 search results - page 72 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
PR
2007
149views more  PR 2007»
13 years 9 months ago
Real-time detection of steam in video images
In this paper, we present a real-time image processing technique for the detection of steam in video images. The assumption made is that the presence of steam acts as a blurring p...
Ricardo J. Ferrari, H. Zhang, C. R. Kube
FGCS
2011
149views more  FGCS 2011»
13 years 4 months ago
Adaptive resource provisioning for read intensive multi-tier applications in the cloud
A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, current SLAs offered by cloud infrastructure providers do ...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...
INFOCOM
2009
IEEE
14 years 4 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
SIGSOFT
2003
ACM
14 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
BILDMED
2009
207views Algorithms» more  BILDMED 2009»
13 years 11 months ago
Polyp Segmentation in NBI Colonoscopy
Endoscopic screening of the colon (colonoscopy) is performed to prevent cancer and to support therapy. During intervention colon polyps are located, inspected and, if need be, remo...
Sebastian Gross, Manuel Kennel, Thomas Stehle, Jon...