Sciweavers

625 search results - page 116 / 125
» Generalized Ring Signatures
Sort
View
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
ISSTA
2004
ACM
14 years 1 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
MIR
2004
ACM
154views Multimedia» more  MIR 2004»
14 years 1 months ago
Fast and robust short video clip search using an index structure
In this paper, we present an index structure-based method to fast and robustly search short video clips in large video collections. First we temporally segment a given long video ...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Changsheng Xu
MM
2004
ACM
118views Multimedia» more  MM 2004»
14 years 1 months ago
Articulation, the letter, and the spirit in the aesthetics of narrative
A furthered understanding of the aesthetic aspects of narrative is important to both people and machines who wish to author pleasing narratives. This paper gives an account of the...
Hugo Liu
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
14 years 1 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu