Sciweavers

1862 search results - page 97 / 373
» Constrained pattern matching
Sort
View
105
Voted
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
98
Voted
RAID
2009
Springer
15 years 7 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
118
Voted
CCGRID
2007
IEEE
15 years 7 months ago
Analysis and Synthesis of Pseudo-Periodic Job Arrivals in Grids: A Matching Pursuit Approach
Pseudo-periodicity is one of the basic job arrival patterns on data-intensive clusters and Grids. In this paper, a signal decomposition methodology called matching pursuit is appl...
Hui Li, Richard Heusdens, Michael Muskulus, Lex Wo...
185
Voted
SIGMOD
2006
ACM
141views Database» more  SIGMOD 2006»
16 years 27 days ago
Contour map matching for event detection in sensor networks
Many sensor network applications, such as object tracking and disaster monitoring, require effective techniques for event detection. In this paper, we propose a novel event detect...
Wenwei Xue, Qiong Luo, Lei Chen 0002, Yunhao Liu
VLSISP
2008
140views more  VLSISP 2008»
15 years 19 days ago
Regular Expression Matching in Reconfigurable Hardware
In this paper we describe a regular expression pattern matching approach for reconfigurable hardware. Following a Non-deterministic Finite Automata direction, we introduce three ne...
Ioannis Sourdis, João Bispo, João M....