Sciweavers

1804 search results - page 164 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SIGSOFT
2003
ACM
16 years 5 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
PSB
2001
15 years 5 months ago
PIES, A Protein Interaction Extraction System
We consider the problem of extracting, manipulating, and managing biological pathways, especially protein-protein interaction pathways. We discuss here the Protein Interaction Ext...
Limsoon Wong
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 8 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
ICPR
2010
IEEE
15 years 4 months ago
Multi-object Segmentation in a Projection Plane Using Subtraction Stereo
We propose a method for multi-object segmentation in a projection plane. Our algorithm requires a stereo camera system called Subtraction Stereo, which extracts foreground informa...
Toru Ubukata, Kenji Terabayashi, Alessandro Moro, ...
IBPRIA
2005
Springer
15 years 10 months ago
A Real-Time Driver Visual Attention Monitoring System
Abstract. This paper describes a framework for analyzing video sequences of a driver and determining his level of attention. The proposed system deals with the computation of eyeli...
Jorge Batista