Sciweavers

2236 search results - page 304 / 448
» Intrusion detection techniques and approaches
Sort
View
EDBTW
2006
Springer
14 years 10 days ago
Efficient Integrity Checking over XML Documents
The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. T...
Daniele Braga, Alessandro Campi, Davide Martinengh...
USS
2004
13 years 11 months ago
Very Fast Containment of Scanning Worms
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
Nicholas Weaver, Stuart Staniford, Vern Paxson
SPIESR
1996
126views Database» more  SPIESR 1996»
13 years 11 months ago
Tools for Compressed-Domain Video Indexing and Editing
Indexing and editing digital video directly in the compressed domain offer many advantages in terms of storage efficiency and processing speed. We have designed automatic tools in...
Jianhao Meng, Shih-Fu Chang
IJRR
2007
186views more  IJRR 2007»
13 years 10 months ago
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract a person’s activities and significant plac...
Lin Liao, Dieter Fox, Henry A. Kautz
TSE
1998
78views more  TSE 1998»
13 years 10 months ago
Inconsistency Management for Multiple-View Software Development Environments
Developers need tool support to help manage the wide range of inconsistencies that occur during software development. Such tools need to provide developers with ways to define, de...
John C. Grundy, John G. Hosking, Warwick B. Mugrid...