Sciweavers

910 search results - page 109 / 182
» Automatic Metadata Generation using Associative Networks
Sort
View
105
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 6 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
117
Voted
CONEXT
2006
ACM
15 years 4 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ISMIR
2005
Springer
132views Music» more  ISMIR 2005»
15 years 6 months ago
Syncplayer - An Advanced System for Multimodal Music Access
In this paper, we present the SyncPlayer system for multimodal presentation of high quality audio and associated music-related data. Using the SyncPlayer client interface, a user ...
Frank Kurth, Meinard Müller, David Damm, Chri...
102
Voted
OSDI
2004
ACM
16 years 25 days ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
113
Voted
CORR
2006
Springer
154views Education» more  CORR 2006»
15 years 17 days ago
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...