Sciweavers

1151 search results - page 106 / 231
» Achieving Scalability in Real-Time Systems
Sort
View
CEAS
2007
Springer
15 years 4 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
MMM
2005
Springer
167views Multimedia» more  MMM 2005»
15 years 3 months ago
A Framework for Sub-Window Shot Detection
Browsing a digital video library can be very tedious especially with an ever expanding collection of multimedia material. We present a novel framework for extracting sub-window sh...
Chuohao Yeo, Yongwei Zhu, Qibin Sun, Shih-Fu Chang

Publication
148views
14 years 11 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
ACSW
2006
14 years 11 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
ATAL
2010
Springer
14 years 11 months ago
Trading agents for the smart electricity grid
The vision of the Smart Grid includes the creation of intelligent electricity supply networks to allow efficient use of energy resources, reduce carbon emissions and are robust to...
Perukrishnen Vytelingum, Sarvapali D. Ramchurn, Th...