Sciweavers

2874 search results - page 507 / 575
» Intrusion Detection: Systems and Models
Sort
View
ESOP
2001
Springer
14 years 2 months ago
On the Complexity of Constant Propagation
Constant propagation (CP) is one of the most widely used optimizations in practice (cf. [9]). Intuitively, it addresses the problem of statically detecting whether an expression al...
Markus Müller-Olm, Oliver Rüthing
ESORICS
2010
Springer
13 years 10 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
BMCBI
2005
161views more  BMCBI 2005»
13 years 10 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
GIS
2010
ACM
13 years 7 months ago
Energy-efficient processing of spatio-temporal queries in wireless sensor networks
Research on Moving Object Databases (MOD) has resulted in sophisticated query mechanisms for moving objects and regions. Wireless Sensor Networks (WSN) support a wide range of app...
Markus Bestehorn, Klemens Böhm, Erik Buchmann...
CVPR
1998
IEEE
15 years 8 hour ago
Video Scene Segmentation via Continuous Video Coherence
In extended video sequences, individual frames are grouped into shots which are defined as a sequence taken by a single camera, and related shots are grouped into scenes which are...
John R. Kender, Boon-Lock Yeo