Sciweavers

1424 search results - page 81 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ACSAC
2005
IEEE
15 years 7 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICMI
2004
Springer
159views Biometrics» more  ICMI 2004»
15 years 6 months ago
A segment-based audio-visual speech recognizer: data collection, development, and initial experiments
This paper presents the development and evaluation of a speaker-independent audio-visual speech recognition (AVSR) system that utilizes a segment-based modeling strategy. To suppo...
Timothy J. Hazen, Kate Saenko, Chia-Hao La, James ...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 8 months ago
Service Composition in Public Networks: Results from a Quasi-Experiment
New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and ...
Ralph Feenstra, Marijn Janssen
LISA
2008
15 years 3 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
DAC
1995
ACM
15 years 5 months ago
The Case for Design Using the World Wide Web
— Most information and services required today by designers will soon become available as documents distributed in a wide area hypermedia network. New integration services are re...
Mário J. Silva, Randy H. Katz