Sciweavers

58 search results - page 6 / 12
» Using Rule-Based Activity Descriptions to Evaluate Intrusion...
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques
In this work we propose a model (in)validation approach to gait recognition, using a system that tries to discriminate specific activities of people. The recognition process depar...
Roberto Lublinerman, Necmiye Ozay, Dimitrios Zarpa...
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CLEF
2007
Springer
14 years 1 months ago
Hindi to English and Marathi to English Cross Language Information Retrieval Evaluation
In this paper, we present our Hindi to English and Marathi to English CLIR systems developed as part of our participation in the CLEF 2007 Ad-Hoc Bilingual task. We take a query tr...
Manoj Kumar Chinnakotla, Sagar Ranadive, Om P. Dam...
AI
1999
Springer
13 years 7 months ago
Using Grice's maxim of Quantity to select the content of plan descriptions
Intelligent systems are often called upon to form plans that direct their own or other agents' activities. For these systems, the ability to describe plans to people in natur...
R. Michael Young
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash