Sciweavers

568 search results - page 72 / 114
» Regular Polygon Detection
Sort
View
CCS
2003
ACM
14 years 20 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SPIESR
2004
131views Database» more  SPIESR 2004»
13 years 8 months ago
Audio-visual event detection based on mining of semantic audio-visual labels
Removing commercials from television programs is a much sought-after feature for a personal video recorder. In this paper, we employ an unsupervised clustering scheme (CM Detect) ...
King-Shy Goh, Koji Miyahara, Regunathan Radhakrish...
SIGCOMM
2010
ACM
13 years 7 months ago
Detecting the performance impact of upgrades in large operational networks
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of up...
Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman S...
ARITH
2005
IEEE
14 years 1 months ago
A Hardware Algorithm for Integer Division
Abstract— A hardware algorithm for integer division is proposed. It is based on the digit-recurrence, non-restoring division algorithm. Fast computation is achieved by the use of...
Naofumi Takagi, Shunsuke Kadowaki, Kazuyoshi Takag...
IPSN
2003
Springer
14 years 19 days ago
Boundary Estimation in Sensor Networks: Theory and Methods
Sensor networks have emerged as a fundamentally new tool for monitoring spatially distributed phenomena. This paper investigates a strategy by which sensor nodes detect and estima...
Robert Nowak, Urbashi Mitra