Sciweavers

2509 search results - page 484 / 502
» Transactional stream processing
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
IWIC
2007
Springer
14 years 1 months ago
Collaborative Platform for Multilingual Resource Development and Intercultural Communication
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Virach Sornlertlamvanich, Thatsanee Charoenporn, K...
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
14 years 1 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
SIGCOMM
2006
ACM
14 years 1 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
AVSS
2005
IEEE
14 years 1 months ago
View registration using interesting segments of planar trajectories
We introduce a method for recovering the spatial and temporal alignment between two or more views of objects moving over a ground plane. Existing approaches either assume that the...
Walter Nunziati, Jonathan Alon, Stan Sclaroff, Alb...