Sciweavers

401 search results - page 40 / 81
» Delegatable Functional Signatures
Sort
View
149
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
121
Voted
ADHOCNOW
2006
Springer
15 years 6 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
127
Voted
CCCG
2008
15 years 1 months ago
Partial Matching of Planar Polygons Under Translation and Rotation
Curve matching is an important computational task for domains such as: reconstruction of archaeological fragments, forensics investigation, measuring melodic similarity, and model...
Eric McCreath
98
Voted
ICMCS
2010
IEEE
258views Multimedia» more  ICMCS 2010»
15 years 1 months ago
A comparative study of similarity measures for content-based multimedia retrieval
Determining similarities among data objects is a core task of content-based multimedia retrieval systems. Approximating data object contents via flexible feature representations, ...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
85
Voted
AML
2008
53views more  AML 2008»
15 years 17 days ago
Pairs, sets and sequences in first-order theories
In this paper we study the idea of theories with containers, like sets, pairs, sequences. We provide a modest framework to study such theories. We prove two concrete results. Firs...
Albert Visser