Sciweavers

935 search results - page 119 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
RAID
2010
Springer
13 years 8 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
14 years 11 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou
CVIU
2010
267views more  CVIU 2010»
13 years 7 months ago
Accelerated hardware video object segmentation: From foreground detection to connected components labelling
This paper demonstrates the use of a single-chip FPGA for the segmentation of moving objects in a video sequence. The system maintains highly accurate background models, and integ...
Kofi Appiah, Andrew Hunter, Patrick Dickinson, Hon...
VLDB
1994
ACM
162views Database» more  VLDB 1994»
14 years 2 months ago
NAOS - Efficient and Modular Reactive Capabilities in an Object-Oriented Database System
This paper describes the design and implementation of NAOS, an active rule component in the object-oriented database system 02. The contribution of this work is related to two mai...
Christine Collet, Thierry Coupaye, T. Svensen
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 4 months ago
Inter-Symbol Interference Mitigation in High-Data-Rate UWB Systems
— The design of ultra-wideband (UWB) impulse radio receivers has to cope with complex signal propagation environments with dense multipath fading, which complicate channel estima...
Vincenzo Lottici, Lin Wu, Zhi Tian