Sciweavers

380 search results - page 44 / 76
» Time Capsule Signature
Sort
View
CIDM
2007
IEEE
13 years 8 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
ERSA
2010
217views Hardware» more  ERSA 2010»
13 years 6 months ago
FPGA for Computing the Pixel Purity Index Algorithm on Hyperspectral Images
The pixel purity index algorithm is employed in remote sensing for analyzing hyperspectral images. A single pixel usually covers several different materials, and its observed spect...
Carlos González, Daniel Mozos, Javier Resan...
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
14 years 9 months ago
Power Conservative Multi-Attribute Queries on Data Broadcast
In this paper, we study power conservation techniques for multi-attribute queries on wireless data broadcast channels. Indexing data on broadcast channels can improve client filte...
Qinglong Hu, Wang-Chien Lee, Dik Lun Lee
ESOP
2004
Springer
14 years 1 months ago
From Constraints to Finite Automata to Filtering Algorithms
Abstract. We introduce an approach to designing filtering algorithms by derivation from finite automata operating on constraint signatures. We illustrate this approach in two cas...
Mats Carlsson, Nicolas Beldiceanu
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 1 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...