Sciweavers

1353 search results - page 237 / 271
» Securing Current and Future Process Control Systems
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 2 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
137
Voted
PRL
2007
287views more  PRL 2007»
15 years 2 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
157
Voted
WIDM
2004
ACM
15 years 8 months ago
Probabilistic models for focused web crawling
A Focused crawler must use information gleaned from previously crawled page sequences to estimate the relevance of a newly seen URL. Therefore, good performance depends on powerfu...
Hongyu Liu, Evangelos E. Milios, Jeannette Janssen
151
Voted
UIST
2000
ACM
15 years 7 months ago
Fluid sketches: continuous recognition and morphing of simple hand-drawn shapes
We describe a new sketching interface in which shape recognition and morphing are tightly coupled. Raw input strokes are continuously morphed into ideal geometric shapes, even bef...
James Arvo, Kevin Novins
156
Voted
SIAMJO
2011
14 years 9 months ago
Adaptive Multilevel Inexact SQP Methods for PDE-Constrained Optimization
We present a class of inexact adaptive multilevel trust-region SQP-methods for the efficient solution of optimization problems governed by nonlinear partial differential equations...
J. Carsten Ziems, Stefan Ulbrich