Sciweavers

12257 search results - page 2128 / 2452
» Analysis of Algorithms
Sort
View
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 10 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
ANCS
2005
ACM
15 years 10 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
MINENET
2005
ACM
15 years 10 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
MUM
2005
ACM
129views Multimedia» more  MUM 2005»
15 years 10 months ago
Mobile camera-based adaptive viewing
In this paper, we present an approach for facilitating user interaction on mobile devices, focusing on camera-enabled mobile phones. A user interacts with an application by moving...
Antonio Haro, Koichi Mori, Vidya Setlur, Tolga K. ...
SAC
2005
ACM
15 years 10 months ago
A pivot-based index structure for combination of feature vectors
We present a novel indexing schema that provides efficient nearest-neighbor queries in multimedia databases consisting of objects described by multiple feature vectors. The bene...
Benjamin Bustos, Daniel A. Keim, Tobias Schreck
« Prev « First page 2128 / 2452 Last » Next »