Sciweavers

2236 search results - page 88 / 448
» Intrusion detection techniques and approaches
Sort
View
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
15 years 10 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
CORR
2010
Springer
257views Education» more  CORR 2010»
14 years 7 months ago
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence
Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific hu...
Harshith C, Karthik R. Shastry, Manoj Ravindran, M...
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...
ACSAC
2005
IEEE
15 years 3 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
IEEEPACT
2007
IEEE
15 years 4 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan