Sciweavers

892 search results - page 74 / 179
» Coordinated Scan Detection
Sort
View
BMCBI
2005
120views more  BMCBI 2005»
13 years 9 months ago
Harshlight: a "corrective make-up" program for microarray chips
Background: Microscopists are familiar with many blemishes that fluorescence images can have due to dust and debris, glass flaws, uneven distribution of fluids or surface coatings...
Mayte Suárez-Fariñas, Maurizio Pelle...
ICRA
1998
IEEE
148views Robotics» more  ICRA 1998»
14 years 2 months ago
Position Estimation Using Principal Components of Range Data
1 sensors is to construct a structural description from sensor data and to match this description to a previously acquired model [Crowley 85]. An alternative is to project individu...
James L. Crowley, Frank Wallner, Bernt Schiele
UIST
2003
ACM
14 years 3 months ago
Automatic thumbnail cropping and its effectiveness
Thumbnail images provide users of image retrieval and browsing systems with a method for quickly scanning large numbers of images. Recognizing the objects in an image is important...
Bongwon Suh, Haibin Ling, Benjamin B. Bederson, Da...
RAID
2010
Springer
13 years 8 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
CCS
2007
ACM
14 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...