Sciweavers

264 search results - page 37 / 53
» New Issues in Near-duplicate Detection
Sort
View
DAWAK
2009
Springer
13 years 5 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
NPAR
2009
ACM
14 years 2 months ago
Appearance-guided synthesis of element arrangements by example
We present a technique for the analysis and re-synthesis of 2D arrangements of stroke-based vector elements. The capture of an artist’s style by the sole posterior analysis of h...
Thomas Hurtut, Pierre-Edouard Landes, Joëlle ...
PIMRC
2008
IEEE
14 years 2 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
ACSD
2006
IEEE
154views Hardware» more  ACSD 2006»
14 years 1 months ago
Concurrency in Distributed Systems under Autonomous and Enforced Actions
Recently, the formal approach of I–Systems has been newly hed through an abstract axiomatic system where events in system components are solely derived and defined from their b...
Arnim Wedig, Horst F. Wedde, Anca M. Lazarescu, El...
IMC
2006
ACM
14 years 1 months ago
binpac: a yacc for writing application protocol parsers
A key step in the semantic analysis of network traffic is to parse the traffic stream according to the high-level protocols it contains. This process transforms raw bytes into s...
Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. ...