Sciweavers

4228 search results - page 770 / 846
» Models and Methods in Comparative Genomics
Sort
View
RAID
2004
Springer
14 years 3 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
PG
2003
IEEE
14 years 3 months ago
High-Quality Point-Based Rendering on Modern GPUs
In the last years point-based rendering has been shown to offer the potential to outperform traditional triangle based rendering both in speed and visual quality when it comes to ...
Mario Botsch, Leif Kobbelt
CIVR
2003
Springer
166views Image Analysis» more  CIVR 2003»
14 years 3 months ago
Evaluation of Expression Recognition Techniques
The most expressive way humans display emotions is through facial expressions. In this work we report on several advances we have made in building a system for classification of f...
Ira Cohen, Nicu Sebe, Yafei Sun, Michael S. Lew, T...
FM
2003
Springer
146views Formal Methods» more  FM 2003»
14 years 3 months ago
Interacting State Machines for Mobility
We present two instantiations of generic Interactive State Machines (ISMs) with mobility features which are useful for modeling and verifying dynamically changing mobile systems. I...
Thomas A. Kuhn, David von Oheimb
ACSAC
2002
IEEE
14 years 3 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel