Sciweavers

1525 search results - page 204 / 305
» Matching with Regular Constraints
Sort
View
FPL
2003
Springer
100views Hardware» more  FPL 2003»
15 years 9 months ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...
APSEC
2002
IEEE
15 years 9 months ago
Embedding XML Processing Toolkit on General Purpose Programming Language
Many methods for XML processing have been proposed in the last few years. One popular approach is to process XML documents by using existing programming languages. Another popular...
Tetsuo Kamina, Tetsuo Tamai
ECCV
2010
Springer
15 years 9 months ago
From a Set of Shapes to Object Discovery
Abstract. This paper presents an approach to object discovery in a given unlabeled image set, based on mining repetitive spatial configurations of image contours. Contours that si...
FPGA
1992
ACM
176views FPGA» more  FPGA 1992»
15 years 8 months ago
Minimization of Permuted Reed-Muller Trees for Cellular Logic
The new family of Field Programmable Gate Arrays, CLI6000 from Concurrent Logic Inc realizes the truly Cellular Logic. It has been mainly designed for the realization of data path...
Li-Fei Wu, Marek A. Perkowski
ACSAC
2004
IEEE
15 years 8 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller