Sciweavers

2564 search results - page 56 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
143
Voted
ISVC
2010
Springer
15 years 1 months ago
A Human Inspired Local Ratio-Based Algorithm for Edge Detection in Fluorescent Cell Images
Abstract. We have developed a new semi-automated method for segmenting images of biological cells seeded at low density on tissue culture substrates, which we use to improve the ge...
Joe Chalfoun, Alden Dima, Adele P. Peskin, John T....
104
Voted
CHI
2003
ACM
16 years 3 months ago
Gummi: user interface for deformable computers
We show interaction possibilities and a graphical user interface for deformable, mobile devices. WIMP (windows, icons, mouse, pointer) interfaces are not practical on mobile devic...
Carsten Schwesig, Ivan Poupyrev, Eijiro Mori
100
Voted
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 6 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
95
Voted
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 9 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
96
Voted
NDSS
2006
IEEE
15 years 8 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller