Sciweavers

571 search results - page 29 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
DSN
2000
IEEE
15 years 7 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
GLOBECOM
2008
IEEE
15 years 3 months ago
Hierarchical Scanning Algorithm for Integrated Mobile and Nomadic Access Systems
—In next generation wireless networks, not only wide area cells to provide moderate data rate with full mobility but also local area cells to support high data rate with local mo...
Jung-Min Moon, Dong-Ho Cho
108
Voted
ICRA
2009
IEEE
148views Robotics» more  ICRA 2009»
15 years 9 months ago
Graph-based robust shape matching for robotic application
— Shape is one of the useful information for object detection. The human visual system can often recognize objects based on the 2-D outline shape alone. In this paper, we address...
Hanbyul Joo, Yekeun Jeong, Olivier Duchenne, Seong...
IPPS
2007
IEEE
15 years 9 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
100
Voted
CIKM
2003
Springer
15 years 7 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...