Sciweavers

2564 search results - page 343 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
IPPS
2010
IEEE
13 years 6 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...
CHI
2006
ACM
14 years 8 months ago
Tabletop sharing of digital photographs for the elderly
We have recently begun to see hardware support for the tabletop user interface, offering a number of new ways for humans to interact with computers. Tabletops offer great potentia...
Trent Apted, Judy Kay, Aaron J. Quigley
COLING
1994
13 years 9 months ago
A "not-so-shallow" parser for collocational analysis
Collocational analysis is the basis of many studies on lexical acquisition. Collocations are extracted from corpora using more or less shallow processing techniques, that span from...
Roberto Basili, Maria Teresa Pazienza, Paola Velar...
MM
2004
ACM
229views Multimedia» more  MM 2004»
14 years 1 months ago
Generating 3D views of facial expressions from frontal face video based on topographic analysis
In this paper, we report our newly developed 3D face modeling system with arbitrary expressions in a high level of detail using the topographic analysis and mesh instantiation pro...
Lijun Yin, Kenny Weiss
ICDCS
2010
IEEE
14 years 7 days ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...