Sciweavers

26 search results - page 3 / 6
» Online Signature Generation for Windows Systems
Sort
View
ERCIMDL
1999
Springer
121views Education» more  ERCIMDL 1999»
13 years 10 months ago
An Indexing, Browsing, Search and Retrieval System for Audiovisual Libraries
This paper describes an application which enables the computer-assisted generation of Dublin Core-based metadata descriptions and online digital visual summaries for videos. It is...
Jane Hunter, Jan Newmarch
MOBISYS
2008
ACM
14 years 5 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
RAID
2000
Springer
13 years 9 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
DASFAA
2011
IEEE
525views Database» more  DASFAA 2011»
12 years 9 months ago
StreamFitter: A Real Time Linear Regression Analysis System for Continuous Data Streams
In this demo, we present the StreamFitter system for real-time regression analysis on continuous data streams. In order to perform regression on data streams, it is necessary to co...
Chandima H. Nadungodage, Yuni Xia, Fang Li, Jaehwa...
ICAC
2006
IEEE
14 years 8 days ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...