Sciweavers

156 search results - page 24 / 32
» Information Filters and Their Implementation in the SYLLOG S...
Sort
View
AIPRF
2008
13 years 9 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
DEBS
2007
ACM
13 years 11 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
COGCOM
2010
107views more  COGCOM 2010»
13 years 4 months ago
Where to Look Next? Combining Static and Dynamic Proto-objects in a TVA-based Model of Visual Attention
To decide ``Where to look next ?'' is a central function of the attention system of humans, animals and robots. Control of attention depends on three factors, that is, lo...
Marco Wischnewski, Anna Belardinelli, Werner X. Sc...
ISMAR
2006
IEEE
14 years 1 months ago
Interactive context-driven visualization tools for augmented reality
In this article we present an interaction tool, based on the Magic Lenses technique, that allows a 3D scene to be affected dynamically given contextual information, for example, t...
Erick Méndez, Denis Kalkofen, Dieter Schmal...
CORR
2006
Springer
186views Education» more  CORR 2006»
13 years 7 months ago
SASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of dat...
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...