Sciweavers

2913 search results - page 441 / 583
» How Much to Copy
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
SIGMOD
2010
ACM
151views Database» more  SIGMOD 2010»
13 years 9 months ago
Exploring schema similarity at multiple resolutions
Large, dynamic, and ad-hoc organizations must frequently initiate data integration and sharing efforts with insufficient awareness of how organizational data sources are related. ...
Ken Smith, Craig Bonaceto, Chris Wolf, Beth Yost, ...
ICASSP
2010
IEEE
13 years 9 months ago
Anti-forensics of JPEG compression
The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To address this problem, there has been much recent w...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICASSP
2010
IEEE
13 years 9 months ago
Distributed bearing estimation via matrix completion
We consider bearing estimation of multiple narrow-band plane waves impinging on an array of sensors. For this problem, bearing estimation algorithms such as minimum variance disto...
Andrew Waters, Volkan Cevher
AAMAS
2008
Springer
13 years 9 months ago
Task dynamics in self-organising task groups: expertise, motivational, and performance differences of specialists and generalist
Abstract Multi-agent simulation is applied to explore how different types of task variety cause workgroups to change their task allocation accordingly. We studied two groups, gener...
Kees Zoethout, Wander Jager, Eric Molleman