Sciweavers

13180 search results - page 2394 / 2636
» Network Models
Sort
View
HAIS
2010
Springer
15 years 8 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
125
Voted
RECOMB
2003
Springer
16 years 4 months ago
A multi-expert system for the automatic detection of protein domains from sequence information
We describe a novel method for detecting the domain structure of a protein from sequence information alone. The method is based on analyzing multiple sequence alignments that are ...
Niranjan Nagarajan, Golan Yona
139
Voted
FGR
2002
IEEE
171views Biometrics» more  FGR 2002»
15 years 9 months ago
An Approach Based on Phonemes to Large Vocabulary Chinese Sign Language Recognition
Hitherto, the major challenge to sign language recognition is how to develop approaches that scale well with increasing vocabulary size. In this paper we present an approach to la...
Chunli Wang, Shiguang Shan, Wen Gao
HPCA
1996
IEEE
15 years 8 months ago
Improving Release-Consistent Shared Virtual Memory Using Automatic Update
Shared virtual memory is a software technique to provide shared memory on a network of computers without special hardware support. Although several relaxed consistency models and ...
Liviu Iftode, Cezary Dubnicki, Edward W. Felten, K...
DEXA
2010
Springer
266views Database» more  DEXA 2010»
15 years 5 months ago
DBOD-DS: Distance Based Outlier Detection for Data Streams
Data stream is a newly emerging data model for applications like environment monitoring, Web click stream, network traffic monitoring, etc. It consists of an infinite sequence of d...
Md. Shiblee Sadik, Le Gruenwald
« Prev « First page 2394 / 2636 Last » Next »