Sciweavers

7112 search results - page 1220 / 1423
» Power in normative systems
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ACSAC
2006
IEEE
14 years 1 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
ANSS
2004
IEEE
14 years 1 months ago
SENS: A Sensor, Environment and Network Simulator
Recent advances in micro electro-mechanical systems and VLSI lithography have enabled the miniaturization of sensors and controllers. Such minitiarization facilitates the deployme...
Sameer Sundresh, WooYoung Kim, Gul Agha
CCGRID
2004
IEEE
14 years 1 months ago
Net-dbx-G: a Web-based debugger of MPI programs over Grid environments
Net-dbx-G is a tool that utilizes Java and other World Wide Web tools as an interface to Grid services to help Grid application developers debug their MPI programs from anywhere i...
Panayiotis Neophytou, Neophytos Neophytou, Paraske...
CGI
2004
IEEE
14 years 1 months ago
Face Recognition Using Computer-Generated Database
Many face database and recognition systems have been constructed in specially designed studios with various illuminations, poses, and expressions. However, none of these databases...
Won-Sook Lee, Kyung-Ah Sohn
« Prev « First page 1220 / 1423 Last » Next »