Sciweavers

2558 search results - page 194 / 512
» Analysis of Generalized Pattern Searches
Sort
View
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 9 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
ICASSP
2007
IEEE
15 years 11 months ago
Breaking the Limitation of Manifold Analysis for Super-Resolution of Facial Images
A novel method for robust super-resolution offace images is proposed in this paper. Face super-resolution is a particular interest in video surveillance where face images have typ...
Sung Won Park, Marios Savvides
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 5 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
IDEAL
2010
Springer
15 years 3 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
IMC
2010
ACM
15 years 3 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...