Sciweavers

2564 search results - page 351 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ISPASS
2009
IEEE
14 years 3 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 1 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 17 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICRA
2009
IEEE
190views Robotics» more  ICRA 2009»
14 years 3 months ago
Whole body motion primitive segmentation from monocular video
Abstract— This paper proposes a novel approach for motion primitive segmentation from continuous full body human motion captured on monocular video. The proposed approach does no...
Dana Kulic, Dongheui Lee, Yoshihiko Nakamura
MICCAI
1999
Springer
14 years 17 days ago
A 3d Puzzle for Learning Anatomy
We present a new metaphor for learning anatomy - the 3d puzzle. With this metaphor students learn anatomic relations by assembling a geometric model themselves. For this purpose, a...
Bernhard Preim, Felix Ritter, Oliver Deussen