Sciweavers

1949 search results - page 205 / 390
» Protective Interface Specifications
Sort
View
USS
2004
15 years 4 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
WORM
2004
15 years 4 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
ICIP
2003
IEEE
16 years 4 months ago
Wavelet-based level set evolution for classification of textured images
We present a supervised classification model based on a variational approach. This model is specifically devoted to textured images. We want to get a partition of an image, compos...
Jean-François Aujol, Gilles Aubert, Laure B...
WWW
2008
ACM
16 years 3 months ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...
WWW
2005
ACM
16 years 3 months ago
XJ: facilitating XML processing in Java
The increased importance of XML as a data representation format has led to several proposals for facilitating the development of applications that operate on XML data. These propo...
Matthew Harren, Mukund Raghavachari, Oded Shmueli,...