Sciweavers

25111 search results - page 4940 / 5023
» Information Systems
Sort
View
BTW
2003
Springer
118views Database» more  BTW 2003»
15 years 5 months ago
Skalierbare Verarbeitung von XML mit Infonyte-DB
Abstract: The emerging penetration of IT architectures with XML leads to increasing XML data volumes. Available tools often fail in realizing scalable XML processing for large XML ...
Thomas Tesch, Peter Fankhauser, Tim Weitzel
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
15 years 5 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
DAGM
2003
Springer
15 years 5 months ago
A Computational Model of Early Auditory-Visual Integration
We introduce a computational model of sensor fusion based on the topographic representations of a ”two-microphone and one camera” configuration. Our aim is to perform a robust...
Carsten Schauer, Horst-Michael Gross
DGCI
2003
Springer
15 years 5 months ago
Shape Similarity and Visual Parts
Abstract. Human perception of shape is based on visual parts of objects to a point that a single, significant visual part is sufficient to recognize the whole object. For example,...
Longin Jan Latecki, Rolf Lakämper, Diedrich W...
« Prev « First page 4940 / 5023 Last » Next »