Sciweavers

1804 search results - page 149 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ANCS
2009
ACM
15 years 2 months ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
CVPR
2011
IEEE
14 years 11 months ago
Learning and Matching Multiscale Template Descriptors for Real-Time Detection, Localization and Tracking
We describe a system to learn an object template from a video stream, and localize and track the corresponding object in live video. The template is decomposed into a number of lo...
Taehee Lee, Stefano Soatto
ICDAR
2009
IEEE
15 years 2 months ago
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming
In this paper, we tackle the problem of localizing graphical symbols on complex technical document images by using an original approach to solve the subgraph isomorphism problem. ...
Pierre Le Bodic, Hervé Locteau, Séba...
MHCI
2004
Springer
15 years 9 months ago
Mobile Context Aware Systems: The Intelligence to Support Tasks and Effectively Utilise Resources
: The complex usage of mobile devices coupled with their limited resources in terms of display and processing suggests that being able to understand the context of the user would b...
Russell Beale, Peter Lonsdale