Sciweavers

2492 search results - page 42 / 499
» On the General Signature Trees
Sort
View
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 28 days ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
AAAI
2012
11 years 10 months ago
Non-Intrusive Load Monitoring Using Prior Models of General Appliance Types
Non-intrusive appliance load monitoring is the process of disaggregating a household’s total electricity consumption into its contributing appliances. In this paper we propose a...
Oliver Parson, Siddhartha Ghosh, Mark Weal, Alex R...
ICCAD
1997
IEEE
78views Hardware» more  ICCAD 1997»
13 years 12 months ago
A signature based approach to regularity extraction
Regularity extraction is an important step in the design ow of datapath-dominated circuits. This paper outlines a new method that automatically extracts regular structures from th...
Srinivasa Rao Arikati, Ravi Varadarajan
ICIP
2004
IEEE
14 years 9 months ago
A new similarity measure using hausdorff distance map
Image dissimilarity measure is a hot topic. The measure process is generally composed of an information mining in each image which results in an image signature and then a signatu...
Etienne Baudrier, Frédéric Nicolier,...
CCR
2007
115views more  CCR 2007»
13 years 7 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin