Sciweavers

311 search results - page 31 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
IEEEARES
2008
IEEE
15 years 7 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 4 months ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas
ICMI
2004
Springer
148views Biometrics» more  ICMI 2004»
15 years 6 months ago
Multimodal interface platform for geographical information systems (GeoMIP) in crisis management
A novel interface system for accessing geospatial data (GeoMIP) has been developed that realizes a user-centered multimodal speech/gesture interface for addressing some of the cri...
Pyush Agrawal, Ingmar Rauschert, Keerati Inochanon...
GLOBECOM
2006
IEEE
15 years 7 months ago
A Location-Based Vertical Handoff Decision Algorithm for Heterogeneous Mobile Networks
— Next-generation mobile communication systems will provide “always best connected” services to mobile users via cellular networks that provide wide area coverage for global ...
Jie Zhang, Henry C. B. Chan, Victor C. M. Leung