Sciweavers

1424 search results - page 81 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICMI
2004
Springer
159views Biometrics» more  ICMI 2004»
14 years 1 months ago
A segment-based audio-visual speech recognizer: data collection, development, and initial experiments
This paper presents the development and evaluation of a speaker-independent audio-visual speech recognition (AVSR) system that utilizes a segment-based modeling strategy. To suppo...
Timothy J. Hazen, Kate Saenko, Chia-Hao La, James ...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 3 months ago
Service Composition in Public Networks: Results from a Quasi-Experiment
New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and ...
Ralph Feenstra, Marijn Janssen
LISA
2008
13 years 10 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
DAC
1995
ACM
13 years 11 months ago
The Case for Design Using the World Wide Web
— Most information and services required today by designers will soon become available as documents distributed in a wide area hypermedia network. New integration services are re...
Mário J. Silva, Randy H. Katz