Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
We present an event-driven video adaptation system in this paper. Events are detected by audio/video analysis and annotated by the description schemes (DSs) provided by MPEG-7 Mul...
Min Xu, Jiaming Li, Yiqun Hu, Liang-Tien Chia, Bu-...