Sciweavers

1804 search results - page 263 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DICTA
2009
13 years 11 months ago
Modeling Image Context Using Object Centered Grid
Abstract--Context plays a valuable role in any image understanding task confirmed by numerous studies which have shown the importance of contextual information in computer vision t...
Sobhan Naderi Parizi, Ivan Laptev, Alireza Tavakol...
WWW
2004
ACM
14 years 10 months ago
Web data integration using approximate string join
Web data integration is an important preprocessing step for web mining. It is highly likely that several records on the web whose textual representations differ may represent the ...
Yingping Huang, Gregory R. Madey
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 10 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
CHI
2010
ACM
14 years 3 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...
CN
2007
137views more  CN 2007»
13 years 10 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....