Sciweavers

1804 search results - page 244 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IJCSA
2006
138views more  IJCSA 2006»
14 years 10 months ago
An Integrated System for Cancer-Related Genes Mining from Biomedical Literatures
According to statistics, the rate of having cancer is relatively high for people in developing and developed countries. So cancer can be called as the enemy of human health. With ...
Shih-Nung Chen, Kuo-Cheng Wen
IPPS
2009
IEEE
15 years 4 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
NDSS
2008
IEEE
15 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
EUROGP
2009
Springer
143views Optimization» more  EUROGP 2009»
14 years 8 months ago
A Real-Time Evolutionary Object Recognition System
We have created a real-time evolutionary object recognition system. Genetic Programming is used to automatically search the space of possible computer vision programs guided throug...
Marc Ebner
HT
2003
ACM
15 years 3 months ago
Combining spatial and navigational structure in the hyper-hitchcock hypervideo editor
Existing hypertext systems have emphasized either the navigational or spatial expression of relationships between objects. We are exploring the combination of these modes of expre...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...