Sciweavers

910 search results - page 109 / 182
» Automatic Metadata Generation using Associative Networks
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 9 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
CONEXT
2006
ACM
15 years 6 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ISMIR
2005
Springer
132views Music» more  ISMIR 2005»
15 years 8 months ago
Syncplayer - An Advanced System for Multimodal Music Access
In this paper, we present the SyncPlayer system for multimodal presentation of high quality audio and associated music-related data. Using the SyncPlayer client interface, a user ...
Frank Kurth, Meinard Müller, David Damm, Chri...
OSDI
2004
ACM
16 years 3 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
CORR
2006
Springer
154views Education» more  CORR 2006»
15 years 2 months ago
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...