Sciweavers

6574 search results - page 30 / 1315
» Current Signatures: Application
Sort
View
141
Voted
AP2PS
2009
IEEE
15 years 7 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
BIOID
2008
103views Biometrics» more  BIOID 2008»
15 years 2 months ago
Promoting Diversity in Gaussian Mixture Ensembles: An Application to Signature Verification
Abstract. Classifiers based on Gaussian mixture models are good performers in many pattern recognition tasks. Unlike decision trees, they can be described as stable classifier: a s...
Jonas Richiardi, Andrzej Drygajlo, Laetitia Todesc...
BMCBI
2008
132views more  BMCBI 2008»
15 years 25 days ago
Very Important Pool (VIP) genes - an application for microarray-based molecular signatures
Background: Advances in DNA microarray technology portend that molecular signatures from which microarray will eventually be used in clinical environments and personalized medicin...
Zhenqiang Su, Huixiao Hong, Hong Fang, Leming M. S...
102
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
101
Voted
SMI
2006
IEEE
138views Image Analysis» more  SMI 2006»
15 years 6 months ago
Curves-on-Surface: A General Shape Comparison Framework
We develop a new surface matching framework to handle surface comparisons based on a novel mathematical analysis of curves on surfaces, and propose a unique signature for any clos...
Xin Li, Ying He 0001, Xianfeng Gu, Hong Qin