Sciweavers

2804 search results - page 213 / 561
» Next Generation Internet
Sort
View
USS
2004
15 years 5 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp

Book
996views
17 years 1 months ago
The Scientist and Engineer's Guide to Digital Signal Processing
"The world of science and engineering is filled with signals: images from remote space probes, voltages generated by the heart and brain, radar and sonar echoes, seismic vibra...
Steve Smith
ICIP
2009
IEEE
16 years 5 months ago
A Bayesian Formulation For Sub-pixel Refinement In Stereo Orbital Imagery
Generating accurate three dimensional planetary models is becoming increasingly more important as NASA plans manned missions to return to the moon in the next decade. This paper d...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 4 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
CHI
2002
ACM
16 years 4 months ago
Physiological computing
This paper is concerned with how Physiological Computing (PC) and Brain-Computer Interfaces (BCI) may be used to enhance computer games. It is argued that PC offers a greater rang...
Jennifer Allanson, Gillian M. Wilson