Sciweavers

84 search results - page 10 / 17
» Filtering with raster signatures
Sort
View
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 1 months ago
A novel spectral coding in a large graph database
Retrieving related graphs containing a query graph from a large graph database is a key issue in many graph-based applications, such as drug discovery and structural pattern recog...
Lei Zou, Lei Chen 0002, Jeffrey Xu Yu, Yansheng Lu
128
Voted
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 5 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
79
Voted
ICPR
2008
IEEE
15 years 8 months ago
Computational approaches for real-time extraction of soft biometrics
Soft biometrics, as a prescreening filter, contribute to a much smaller candidate pool and allow the overall query to perform better and faster. In this paper, we focus on the eff...
Yang Ran, Gavin Rosenbush, Qinfen Zheng
142
Voted
HOTI
2005
IEEE
15 years 7 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
CCS
2007
ACM
15 years 5 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau