Sciweavers

6574 search results - page 30 / 1315
» Current Signatures: Application
Sort
View
AP2PS
2009
IEEE
14 years 5 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
BIOID
2008
103views Biometrics» more  BIOID 2008»
14 years 13 days ago
Promoting Diversity in Gaussian Mixture Ensembles: An Application to Signature Verification
Abstract. Classifiers based on Gaussian mixture models are good performers in many pattern recognition tasks. Unlike decision trees, they can be described as stable classifier: a s...
Jonas Richiardi, Andrzej Drygajlo, Laetitia Todesc...
BMCBI
2008
132views more  BMCBI 2008»
13 years 10 months ago
Very Important Pool (VIP) genes - an application for microarray-based molecular signatures
Background: Advances in DNA microarray technology portend that molecular signatures from which microarray will eventually be used in clinical environments and personalized medicin...
Zhenqiang Su, Huixiao Hong, Hong Fang, Leming M. S...
ACSAC
2002
IEEE
14 years 3 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
SMI
2006
IEEE
138views Image Analysis» more  SMI 2006»
14 years 4 months ago
Curves-on-Surface: A General Shape Comparison Framework
We develop a new surface matching framework to handle surface comparisons based on a novel mathematical analysis of curves on surfaces, and propose a unique signature for any clos...
Xin Li, Ying He 0001, Xianfeng Gu, Hong Qin