Sciweavers

1513 search results - page 248 / 303
» Cryptographic Pattern Matching
Sort
View
SAC
2004
ACM
14 years 1 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ACSAC
2003
IEEE
14 years 1 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
CCGRID
2003
IEEE
14 years 1 months ago
Noncontiguous I/O Accesses Through MPI-IO
I/O performance remains a weakness of parallel computing systems today. While this weakness is partly attributed to rapid advances in other system components, I/O interfaces avail...
Avery Ching, Alok N. Choudhary, Kenin Coloma, Wei-...
ICDAR
2003
IEEE
14 years 1 months ago
A Fast Multifunctional Approach for Document Image Analysis
Collinear arrangement of objects (such as, text elements or continuous lines) is integral part of any office document image, whether structured or unstructured. The ability to ana...
Abhishek Gattani, Maitrayee Mukerji, Hareish Gu
JCDL
2003
ACM
101views Education» more  JCDL 2003»
14 years 1 months ago
Bibliographic Attribute Extraction from Erroneous References Based on a Statistical Model
In this paper, we propose a method for extracting bibliographic attributes from reference strings captured using Optical Character Recognition (OCR) and an extended hidden Markov ...
Atsuhiro Takasu