Sciweavers

1424 search results - page 144 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
P2P
2006
IEEE
14 years 2 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
APCCM
2009
13 years 9 months ago
Towards Accurate Conflict Detection in a VCS for Model Artifacts: A Comparison of Two Semantically Enhanced Approaches
In collaborative software development the utilization of Version Control Systems (VCSs) is a must. For this important task some graph-based VCSs for model artifacts already emerge...
Kerstin Altmanninger, Gabriele Kotsis
CVPR
2005
IEEE
14 years 1 months ago
Robust Face Detection with Multi-Class Boosting
With the aim to design a general learning framework for detecting faces of various poses or under different lighting conditions, we are motivated to formulate the task as a classi...
Yen-Yu Lin, Tyng-Luh Liu
MIDDLEWARE
2005
Springer
14 years 1 months ago
Composite Subscriptions in Content-Based Publish/Subscribe Systems
Distributed publish/subscribe systems are naturally suited for processing events in distributed systems. However, support for expressing patterns about disparate events and algorit...
Guoli Li, Hans-Arno Jacobsen
WWW
2008
ACM
14 years 9 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru