Sciweavers

1804 search results - page 231 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
TCOM
2010
120views more  TCOM 2010»
14 years 8 months ago
Improved linear soft-input soft-output detection via soft feedback successive interference cancellation
—We propose an improved minimum mean square error (MMSE) vertical Bell Labs layered space-time (V-BLAST) detection technique, called a soft input, soft output, and soft feedback ...
Jun Won Choi, Andrew C. Singer, Jung Woo Lee, Nam ...
SEC
2008
14 years 11 months ago
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. Ho...
Dongwon Seo, Heejo Lee, Ejovi Nuwere
86
Voted
ICMI
2004
Springer
151views Biometrics» more  ICMI 2004»
15 years 3 months ago
Multimodal model integration for sentence unit detection
In this paper, we adopt a direct modeling approach to utilize conversational gesture cues in detecting sentence boundaries, called SUs, in video taped conversations. We treat the ...
Mary P. Harper, Elizabeth Shriberg
94
Voted
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
14 years 11 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
ICC
2007
IEEE
15 years 4 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen