Sciweavers

568 search results - page 72 / 114
» Regular Polygon Detection
Sort
View
85
Voted
CCS
2003
ACM
15 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SPIESR
2004
131views Database» more  SPIESR 2004»
14 years 11 months ago
Audio-visual event detection based on mining of semantic audio-visual labels
Removing commercials from television programs is a much sought-after feature for a personal video recorder. In this paper, we employ an unsupervised clustering scheme (CM Detect) ...
King-Shy Goh, Koji Miyahara, Regunathan Radhakrish...
SIGCOMM
2010
ACM
14 years 10 months ago
Detecting the performance impact of upgrades in large operational networks
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of up...
Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman S...
ARITH
2005
IEEE
15 years 4 months ago
A Hardware Algorithm for Integer Division
Abstract— A hardware algorithm for integer division is proposed. It is based on the digit-recurrence, non-restoring division algorithm. Fast computation is achieved by the use of...
Naofumi Takagi, Shunsuke Kadowaki, Kazuyoshi Takag...
IPSN
2003
Springer
15 years 3 months ago
Boundary Estimation in Sensor Networks: Theory and Methods
Sensor networks have emerged as a fundamentally new tool for monitoring spatially distributed phenomena. This paper investigates a strategy by which sensor nodes detect and estima...
Robert Nowak, Urbashi Mitra