Sciweavers

12289 search results - page 2446 / 2458
» System modeling with mixed object and data models
Sort
View
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
IPSN
2005
Springer
14 years 2 months ago
Quantizer design and distributed encoding algorithm for source localization in sensor networks
— In this paper, we propose a quantizer design algorithm that is optimized for source localization in sensor networks. For this application, the goal is to minimize the amount of...
Yoon Hak Kim, Antonio Ortega
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
14 years 2 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
SWS
2004
ACM
14 years 1 months ago
A formal semantics for P3P
The Platform for Privacy Preferences (P3P), developed by the W3C, provides an XML-based language for websites to encode their datacollection and data-use practices in a machine-re...
Ting Yu, Ninghui Li, Annie I. Antón
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 1 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
« Prev « First page 2446 / 2458 Last » Next »