Sciweavers

6574 search results - page 84 / 1315
» Current Signatures: Application
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
118
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
PAMI
2010
162views more  PAMI 2010»
14 years 7 months ago
Differential Earth Mover's Distance with Its Applications to Visual Tracking
The Earth Mover's Distance (EMD) is a similarity measure that captures perceptual difference between two distributions. Its computational complexity, however, prevents a direc...
Qi Zhao, Zhi Yang, Hai Tao
109
Voted
CVPR
1997
IEEE
16 years 2 months ago
Representation Of Objects In A Volumetric Frequency Domain With Application To Face Recognition
A novel method for representing 3-D objects that unifies viewer and model centered object representations is presented. A unified 3-D frequency-domain representation (called Volum...
Jezekiel Ben-Arie, Dibyendu Nandy
95
Voted
ISBI
2006
IEEE
16 years 1 months ago
Pattern recognition approaches to compute image similarities: application to age related morphological change
We are studying the genetic influence on rates of age related muscle degeneration in C. elegans. For this, we built pattern recognition tools to calculate a morphological score gi...
Nikita Orlov, Josiah Johnston, Tomasz J. Macura, C...