Sciweavers

213 search results - page 28 / 43
» Benchmarking Anomaly-Based Detection Systems
Sort
View
ICIP
2000
IEEE
14 years 8 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
ECOOP
2009
Springer
14 years 7 months ago
Loci: Simple Thread-Locality for Java
This paper presents a simple type system for thread-local data in Java. Classes and types are annotated to express thread-locality and unintended leaks are detected at compile-time...
Tobias Wrigstad, Filip Pizlo, Fadi Meawad, Lei Zha...
SMC
2007
IEEE
151views Control Systems» more  SMC 2007»
14 years 1 months ago
Growing recurrent self organizing map
— The growing Recurrent Self-Organizing Map (GRSOM) is embedded into a standard Self-Organizing Map (SOM) hierarchy. To do so, the KDD benchmark dataset from the International Kn...
Ozge Yeloglu, A. Nur Zincir-Heywood, Malcolm I. He...
SAINT
2005
IEEE
14 years 9 days ago
A Scalable Multi-Replication Framework for Data Grid
Existing replica services on the Grid we know to date assumes point-to-point communication and file transfer protocol. As such, when hundreds to thousands of hosts on the Grid ac...
Shin'ichiro Takizawa, Yasuhito Takamiya, Hidemoto ...
ACSAC
2007
IEEE
14 years 1 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves