Sciweavers

122 search results - page 17 / 25
» Exploiting efficient data mining techniques to enhance intru...
Sort
View
GPC
2009
Springer
14 years 1 months ago
Efficient Parallelized Network Coding for P2P File Sharing Applications
In this paper, we investigate parallel implementation techniques for network coding to enhance the performance of Peer-to-Peer (P2P) file sharing applications. It is known that net...
Karam Park, Joon-Sang Park, Won Woo Ro
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICIP
2010
IEEE
13 years 4 months ago
Rapid stereo-vision enhanced face recognition
This paper presents a real-time face recognition system. The system uses a stereo camera to locate, track, and recognize a person's face. Our algorithm improves state-of-the-...
Sergey Kosov, Thorsten Thormählen, Hans-Peter...
AAAI
2006
13 years 8 months ago
Monitoring Food Safety by Detecting Patterns in Consumer Complaints
EPFC (Emerging Patterns in Food Complaints) is the analytical component of the Consumer Complaint Monitoring System, designed to help the food safety officials to efficiently and ...
Artur Dubrawski, Kimberly Elenberg, Andrew W. Moor...
NETWORK
2007
100views more  NETWORK 2007»
13 years 6 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...