Sciweavers

214 search results - page 29 / 43
» The Feature Selection and Intrusion Detection Problems
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 2 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
ICRA
2009
IEEE
162views Robotics» more  ICRA 2009»
15 years 4 months ago
Distributed sensor analysis for fault detection in tightly-coupled multi-robot team tasks
— This paper presents a distributed version of our previous work, called SAFDetection, which is a sensor analysisbased fault detection approach that is used to monitor tightlycou...
Xingyan Li, Lynne E. Parker
IMC
2003
ACM
15 years 2 months ago
Bitmap algorithms for counting active flows on high speed links
—This paper presents a family of bitmap algorithms that address the problem of counting the number of distinct header patterns (flows) seen on a high-speed link. Such counting c...
Cristian Estan, George Varghese, Mike Fisk
CVPR
2001
IEEE
15 years 11 months ago
Learning Probabilistic Distribution Model for Multi-View Face Detection
Modeling subspaces of a distribution of interest in high dimensional spaces is a challenging problem in pattern analysis. In this paper, we present a novel framework for pose inva...
Lie Gu, Stan Z. Li, HongJiang Zhang