Sciweavers

5435 search results - page 92 / 1087
» Informed Detection Revisited
Sort
View
ICCCN
2008
IEEE
15 years 10 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
CSREASAM
2006
15 years 5 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
ICCV
2009
IEEE
16 years 9 months ago
The Self-Aware Matching Measure for Stereo
We revisit stereo matching functions, a topic that is considered well understood, from a different angle. Our goal is to discover a transformation that operates on the cost or s...
Philippos Mordohai
CHI
2006
ACM
16 years 4 months ago
Everyday practices with mobile video telephony
The mobile phone allowed people to communicate when and where they wanted, dramatically changing how audio telephony was integrated into daily life. With video telephony services ...
Kenton O'Hara, Alison Black, Matthew Lipson
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...