Sciweavers

14190 search results - page 2599 / 2838
» computing 2008
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
AUTONOMICS
2008
ACM
15 years 5 months ago
QoS-aware ant routing with colored pheromones in wireless mesh networks
Inspired by the collective foraging behavior of specific ant species, ant-based routing algorithms are able to find optimal or near optimal packet routes for Wireless Mesh Network...
Martina Umlauft, Wilfried Elmenreich
AUTONOMICS
2008
ACM
15 years 5 months ago
Tracking and tracing containers through distributed sensor middleware
In a container transport system, wireless sensor networks (WSNs) can be used for monitoring products while they are being transported. To be commercially interesting, these WSNs m...
Klaas Thoelen, Sam Michiels, Wouter Joosen
AVSS
2008
IEEE
15 years 5 months ago
Annotation Collection and Online Performance Evaluation for Video Surveillance: The ViSOR Project
This paper presents the Visor (VIdeo Surveillance Online Repository) project designed with the aim of establishing an open platform for collecting, annotating, retrieving, sharing...
Roberto Vezzani, Rita Cucchiara
« Prev « First page 2599 / 2838 Last » Next »