Sciweavers

877 search results - page 172 / 176
» Intrusion detection systems as evidence
Sort
View
ANCS
2005
ACM
15 years 5 months ago
SSA: a power and memory efficient scheme to multi-match packet classification
New network applications like intrusion detection systems and packet-level accounting require multi-match packet classification, where all matching filters need to be reported. Te...
Fang Yu, T. V. Lakshman, Martin Austin Motoyama, R...
ICSE
2007
IEEE-ACM
15 years 11 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
CC
2005
Springer
153views System Software» more  CC 2005»
15 years 5 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
ECCV
2004
Springer
15 years 5 months ago
Computer-Aided Measurement of Solid Breast Tumor Features on Ultrasound Images
This paper presents a new approach in the application of computer vision techniques to the diagnosis of solid breast tumors on ultrasound images. Most works related to medical imag...
Miguel Alemán-Flores, Patricia Alemá...
ISRR
2001
Springer
151views Robotics» more  ISRR 2001»
15 years 4 months ago
Advanced Sonar Sensing
Robotics research is dependent on intelligent, fast, accurate, reliable and cheap sensors. Sonar sensing can fulfil these requirements. Moreover sonar physics provides robotics re...
Lindsay Kleeman