Sciweavers

433 search results - page 74 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
114
Voted
MOBISYS
2008
ACM
16 years 10 days ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
UIST
1993
ACM
15 years 4 months ago
VB2: An Architecture for Interaction in Synthetic Worlds
This paper describes the VB2 architecture for the construction of three-dimensional interactive applications. The system's state and behavior are uniformly represented as a n...
Enrico Gobbetti, Jean-Francis Balaguer, Daniel Tha...
127
Voted
ANCS
2007
ACM
15 years 4 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
113
Voted
ICANN
2003
Springer
15 years 6 months ago
Sparse Coding with Invariance Constraints
We suggest a new approach to optimize the learning of sparse features under the constraints of explicit transformation symmetries imposed on the set of feature vectors. Given a set...
Heiko Wersing, Julian Eggert, Edgar Körner
93
Voted
ICSP
1993
84views more  ICSP 1993»
15 years 2 months ago
A Role-Based Empirical Process Modeling Environment
Much contemporary development process research is based on analyses of process steps, their duration, and the events they propagate. Our initial research in large, mature telecomm...
Brendan G. Cain, James Coplien