Sciweavers

1804 search results - page 146 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ADC
2009
Springer
113views Database» more  ADC 2009»
15 years 11 months ago
Ranking-Constrained Keyword Sequence Extraction from Web Documents
Given a large volume of Web documents, we consider problem of finding the shortest keyword sequences for each of the documents such that a keyword sequence can be rendered to a g...
Ding-Yi Chen, Xue Li, Jing Liu, Xia Chen
IJCV
2007
148views more  IJCV 2007»
15 years 4 months ago
Detection and Tracking of Multiple Metallic Objects in Millimetre-Wave Images
Abstract In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave (MMW) images. The...
Christopher D. Haworth, Yves de Saint-Pern, D. Cla...
VLDB
2007
ACM
146views Database» more  VLDB 2007»
16 years 4 months ago
A Cost-Estimation Component for Statement Sequences
Query generators producing sequences of SQL statements are embedded in many applications. As the execution time of such sequences is often far from optimal, their optimization is ...
Tobias Kraft
BMCBI
2006
127views more  BMCBI 2006»
15 years 4 months ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...
NDSS
2007
IEEE
15 years 10 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...