Sciweavers

1804 search results - page 296 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SERA
2005
Springer
14 years 2 months ago
Generating UML Models from Domain Patterns
The development of a family of applications in a domain can be greatly eased if patterns in the domain are systematically reused. Systematic use of such a pattern can be achieved ...
Dae-Kyoo Kim, Jon Whittle
ATAL
2006
Springer
14 years 19 days ago
MLBP: MAS for large-scale biometric pattern recognition
Abstract. Security systems can observe and hear almost anyone everywhere. However, it is impossible to employ an adequate number of human experts to analyze the information explosi...
Ram Meshulam, Shulamit Reches, Aner Yarden, Sarit ...
ACL
2011
13 years 15 days ago
Learning Sub-Word Units for Open Vocabulary Speech Recognition
Large vocabulary speech recognition systems fail to recognize words beyond their vocabulary, many of which are information rich terms, like named entities or foreign words. Hybrid...
Carolina Parada, Mark Dredze, Abhinav Sethy, Ariya...
ACSAC
2005
IEEE
14 years 2 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
ICCV
2007
IEEE
14 years 10 months ago
Real-Time SLAM Relocalisation
Monocular SLAM has the potential to turn inexpensive cameras into powerful pose sensors for applications such as robotics and augmented reality. However, current implementations l...
Brian Williams, Georg Klein, Ian D. Reid