Sciweavers

2236 search results - page 432 / 448
» Intrusion detection techniques and approaches
Sort
View
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
PREMI
2005
Springer
14 years 1 months ago
Pattern Recognition in Video
Images constitute data that lives in a very high dimensional space, typically of the order of hundred thousand dimensions. Drawing inferences from data of such high dimensions soon...
Rama Chellappa, Ashok Veeraraghavan, Gaurav Aggarw...
WCRE
2003
IEEE
14 years 1 months ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
MM
2003
ACM
165views Multimedia» more  MM 2003»
14 years 1 months ago
Video retrieval using spatio-temporal descriptors
This paper describes a novel methodology for implementing video search functions such as retrieval of near-duplicate videos and recognition of actions in surveillance video. Video...
Daniel DeMenthon, David S. Doermann
SIGCOMM
2003
ACM
14 years 1 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...