Sciweavers

314 search results - page 33 / 63
» An Evaluation of the Effectiveness of Measurement-based Anom...
Sort
View
DATAMINE
2007
93views more  DATAMINE 2007»
13 years 7 months ago
Evaluation of ordinal attributes at value level
We propose a novel context sensitive algorithm for evaluation of ordinal attributes which exploits the information hidden in ordering of attributes’ and class’ values and prov...
Marko Robnik-Sikonja, Koen Vanhoof
ASPDAC
1995
ACM
104views Hardware» more  ASPDAC 1995»
13 years 11 months ago
Power analysis of a 32-bit embedded microcontroller
A new approach for power analysis of microprocessorshas recently been proposed [1]. The idea is to look at the power consumption in a microprocessor from the point of view of the ...
Vivek Tiwari, Mike Tien-Chien Lee
INFOCOM
2009
IEEE
14 years 2 months ago
Blind Detection of Spread Spectrum Flow Watermarks
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes...
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Don...
DSN
2005
IEEE
14 years 1 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
CIKM
2008
Springer
13 years 9 months ago
Real-time new event detection for video streams
Online detection of video clips that present previously unseen events in a video stream is still an open challenge to date. For this online new event detection (ONED) task, existi...
Gang Luo, Rong Yan, Philip S. Yu