Sciweavers

207 search results - page 27 / 42
» Expressive Subgroup Signatures
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ERSA
2010
217views Hardware» more  ERSA 2010»
13 years 6 months ago
FPGA for Computing the Pixel Purity Index Algorithm on Hyperspectral Images
The pixel purity index algorithm is employed in remote sensing for analyzing hyperspectral images. A single pixel usually covers several different materials, and its observed spect...
Carlos González, Daniel Mozos, Javier Resan...
BCB
2010
127views Bioinformatics» more  BCB 2010»
13 years 2 months ago
A novel network model for molecular prognosis
Network-based genome-wide association studies (NWAS) utilize the molecular interactions between genes and functional pathways in biomarker identification. This study presents a no...
Ying-Wooi Wan, Swetha Bose, James Denvir, Nancy La...
ICIP
2005
IEEE
14 years 9 months ago
Expression-invariant face recognition via spherical embedding
Recently, it was proven empirically that facial expressions can be modelled as isometries, that is, geodesic distances on the facial surface were shown to be significantly less se...
Alexander M. Bronstein, Michael M. Bronstein, Ron ...
VMCAI
2010
Springer
14 years 2 months ago
Regular Linear Temporal Logic with Past
This paper upgrades Regular Linear Temporal Logic (RLTL) with past operators and complementation. RLTL is a temporal logic that extends the expressive power of linear temporal logi...
César Sánchez, Martin Leucker