Sciweavers

473 search results - page 78 / 95
» Using transportation distances for measuring melodic similar...
Sort
View
IMC
2009
ACM
15 years 7 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
111
Voted
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
80
Voted
CAIP
1999
Springer
180views Image Analysis» more  CAIP 1999»
15 years 4 months ago
A Scale-Space Approach to Face Recognition from Profiles
A method for face recognition using profile images based on the scale-space filtering is presented in this paper. A grey-level image of profile is thresholded to produce a binary, ...
Zdravko Liposcak, Sven Loncaric
120
Voted
BMCBI
2006
164views more  BMCBI 2006»
15 years 13 days ago
Evaluation of clustering algorithms for gene expression data
Background: Cluster analysis is an integral part of high dimensional data analysis. In the context of large scale gene expression data, a filtered set of genes are grouped togethe...
Susmita Datta, Somnath Datta
CIKM
2005
Springer
15 years 6 months ago
Rotation invariant indexing of shapes and line drawings
We present data representations, distance measures and organizational structures for fast and efficient retrieval of similar shapes in image databases. Using the Hough Transform w...
Michail Vlachos, Zografoula Vagena, Philip S. Yu, ...