Sciweavers

42 search results - page 3 / 9
» Detecting Areas Visited Regularly
Sort
View
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
14 years 7 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
HOTI
2008
IEEE
14 years 1 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
ICPR
2002
IEEE
14 years 8 months ago
Regularized Patch Motion Estimation
This paper presents a new formulation of the problem of motion estimation which attempts to give solutions to classical problems in the field, such as detection of motion disconti...
Ioannis Patras, Marcel Worring
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
14 years 1 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
ISBI
2009
IEEE
14 years 2 months ago
Tunable Tensor Voting for Regularizing Punctate Patterns of Membrane-Bound Protein Signals
Membrane-bound protein, expressed in the basal-lateral region, is heterogeneous and an important endpoint for understanding biological processes. At the optical resolution, membra...
Leandro A. Loss, George Bebis, Bahram Parvin