Sciweavers

1804 search results - page 338 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICASSP
2010
IEEE
13 years 9 months ago
Automatic state discovery for unstructured audio scene classification
In this paper we present a novel scheme for unstructured audio scene classification that possesses three highly desirable and powerful features: autonomy, scalability, and robust...
Julian Ramos, Sajid M. Siddiqi, Artur Dubrawski, G...
ICIP
2002
IEEE
14 years 10 months ago
Hybrid and parallel face classifier based on artificial neural networks and principal component analysis
We present a hybrid and parallel system based on artificial neural networks for a face invariant classifier and general pattern recognition problems. A set of face features is ext...
Peter V. Bazanov, Tae-Kyun Kim, Seok-Cheol Kee, Sa...
ACSAC
2006
IEEE
14 years 2 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
14 years 2 months ago
CMOS contact imager for monitoring cultured cells
— There is a growing interest in developing low cost, low power, highly integrated biosensor systems to characterize individual cells for applications such as cell analysis, drug...
Honghao Ji, Pamela Abshire, M. Urdaneta, Elisabeth...
ASIACRYPT
2005
Springer
14 years 2 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...