Sciweavers

369 search results - page 67 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 3 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
BMCBI
2010
108views more  BMCBI 2010»
14 years 9 months ago
Comparison of scores for bimodality of gene expression distributions and genome-wide evaluation of the prognostic relevance of h
Background: A major goal of the analysis of high-dimensional RNA expression data from tumor tissue is to identify prognostic signatures for discriminating patient subgroups. For t...
Birte Hellwig, Jan G. Hengstler, Marcus Schmidt, M...
IMC
2004
ACM
15 years 2 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
ANCS
2005
ACM
15 years 3 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 2 months ago
Content based photograph slide show with incidental music
In this paper, we proposed a new scheme to generate photograph slide show with incidental music based on the content of the photographs and music. Unlike existing photograph slide...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang