Sciweavers

8177 search results - page 1502 / 1636
» Detecting System Emulators
Sort
View
RAID
2010
Springer
15 years 1 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...
134
Voted
TASLP
2010
126views more  TASLP 2010»
15 years 1 months ago
Modeling Music as a Dynamic Texture
—We consider representing a short temporal fragment of musical audio as a dynamic texture, a model of both the timbral and rhythmical qualities of sound, two of the important asp...
Luke Barrington, Antoni B. Chan, Gert R. G. Lanckr...
137
Voted
TCBB
2010
80views more  TCBB 2010»
15 years 1 months ago
On the Importance of Comprehensible Classification Models for Protein Function Prediction
—The literature on protein function prediction is currently dominated by works aimed at maximizing predictive accuracy, ignoring the important issues of validation and interpreta...
Alex Alves Freitas, Daniela Wieser, Rolf Apweiler
134
Voted
TCS
2010
15 years 1 months ago
On the complexities of consistency checking for restricted UML class diagrams
Automatic debugging of UML class diagrams helps in the visual specification of software systems because users cannot detect errors in logical consistency easily. This paper focus...
Ken Kaneiwa, Ken Satoh
93
Voted
TIFS
2010
82views more  TIFS 2010»
15 years 1 months ago
Lossless data embedding in electronic inks
—This paper presents a novel lossless data embedding algorithm for electronic inks. The proposed algorithm first computes the analytical ink-curve for each stroke as a set of sm...
Hong Cao, Alex C. Kot
« Prev « First page 1502 / 1636 Last » Next »