Sciweavers

1522 search results - page 188 / 305
» Requirements analysis for large scale systems
Sort
View
JSAC
2006
172views more  JSAC 2006»
13 years 7 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
OSDI
2008
ACM
14 years 8 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
CVPR
2000
IEEE
14 years 9 months ago
Boosting Image Retrieval
Online photo sharing systems, such as Flickr and Picasa, provide a valuable source of human-annotated photos. Textual annotations are used not only to describe the visual content ...
Kinh Tieu, Paul A. Viola
ISBI
2004
IEEE
14 years 8 months ago
Automated Interpretation of Subcellular Location Patterns
Fluorescence microscopy is widely used to analyze the distribution of proteins within cells. As currently practiced, the assignment of a protein to a particular organelle is done ...
Robert F. Murphy
WETICE
2007
IEEE
14 years 2 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok