Sciweavers

2236 search results - page 400 / 448
» Intrusion detection techniques and approaches
Sort
View
ACL
2010
13 years 7 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
IMC
2010
ACM
13 years 7 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 5 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
TSP
2010
13 years 3 months ago
A robust method to count and locate audio sources in a multichannel underdetermined mixture
We propose a method to count and estimate the mixing directions in an underdetermined multichannel mixture. The approach is based on the hypothesis that in the neighbourhood of som...
Simon Arberet, Rémi Gribonval, Fréd&...
ICASSP
2011
IEEE
13 years 24 days ago
Feature-based global motion estimation using the Helmholtz principle
Global motion estimation is an important task for various video processing techniques. The estimation itself has to be robust in presence of arbitrarily moving foreground objects....
Michael Tok, Alexander Glantz, Andreas Krutz, Thom...