Sciweavers

2564 search results - page 56 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ISVC
2010
Springer
14 years 10 months ago
A Human Inspired Local Ratio-Based Algorithm for Edge Detection in Fluorescent Cell Images
Abstract. We have developed a new semi-automated method for segmenting images of biological cells seeded at low density on tissue culture substrates, which we use to improve the ge...
Joe Chalfoun, Alden Dima, Adele P. Peskin, John T....
CHI
2003
ACM
16 years 5 days ago
Gummi: user interface for deformable computers
We show interaction possibilities and a graphical user interface for deformable, mobile devices. WIMP (windows, icons, mouse, pointer) interfaces are not practical on mobile devic...
Carsten Schwesig, Ivan Poupyrev, Eijiro Mori
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 3 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 6 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
NDSS
2006
IEEE
15 years 5 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller