Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
This paper describes our experience developing a semantically-rich exploratory interface that integrates a suite of Newsfilm media sources and associated information. Indeed, the a...
Daniel A. Smith, Alisdair Owens, m. c. schraefel, ...
Efficient service discovery in dynamic, crossorganizational VO is one of the challenge aspects in ChinaGrid. Network overlay and search algorithms are two important considerations...
Jing Tie, Hai Jin, Shengli Li, Xuanhua Shi, Hanhua...
The dream of pervasive multimedia retrieval and reuse will not be realized without incorporating semantics in the multimedia database. As video data is penetrating many informatio...
Content-based Image retrieval has become an important part of information retrieval technology. Images can be viewed as high dimensional data and are usually represented by their ...
Ying Liu, Xin Chen, Chengcui Zhang, Alan P. Spragu...