Sciweavers

401 search results - page 40 / 81
» Delegatable Functional Signatures
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
ADHOCNOW
2006
Springer
14 years 2 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
CCCG
2008
13 years 10 months ago
Partial Matching of Planar Polygons Under Translation and Rotation
Curve matching is an important computational task for domains such as: reconstruction of archaeological fragments, forensics investigation, measuring melodic similarity, and model...
Eric McCreath
ICMCS
2010
IEEE
258views Multimedia» more  ICMCS 2010»
13 years 9 months ago
A comparative study of similarity measures for content-based multimedia retrieval
Determining similarities among data objects is a core task of content-based multimedia retrieval systems. Approximating data object contents via flexible feature representations, ...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
AML
2008
53views more  AML 2008»
13 years 8 months ago
Pairs, sets and sequences in first-order theories
In this paper we study the idea of theories with containers, like sets, pairs, sequences. We provide a modest framework to study such theories. We prove two concrete results. Firs...
Albert Visser