Sciweavers

1804 search results - page 153 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ALMOB
2007
155views more  ALMOB 2007»
15 years 4 months ago
Finding coevolving amino acid residues using row and column weighting of mutual information and multi-dimensional amino acid rep
Background: Some amino acid residues functionally interact with each other. This interaction will result in an evolutionary co-variation between these residues – coevolution. Ou...
Rodrigo Gouveia-Oliveira, Anders Gorm Pedersen
AMDO
2000
Springer
15 years 8 months ago
Matching a Human Walking Sequence with a VRML Synthetic Model
- In this paper we present a specific matching technique based on basic motor patterns between two image sequences taken from different view points and a VRML synthetic human model...
Jose Maria Buades Rubio, Ramon Mas, Francisco J. P...
FIW
2009
124views Communications» more  FIW 2009»
15 years 2 months ago
Online Detection of Feature Interactions of CPL Services
The Call Processing Language (CPL) is one of the best known approaches developed for creating telephony services in Internet telephony. Its XML-based structure makes it a flexible ...
Lixiang Wang, Jiuyun Xu, Stephan Reiff-Marganiec
ICCCN
2007
IEEE
15 years 10 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
VIZSEC
2005
Springer
15 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...