Sciweavers

912 search results - page 135 / 183
» Anomaly
Sort
View
ASYNC
2006
IEEE
72views Hardware» more  ASYNC 2006»
14 years 2 months ago
Measuring Deep Metastability
Present measurement techniques do not allow synchronizer reliability to be measured in the region of most interest, that is, beyond the first half cycle of the synchronizer clock....
David Kinniment, Keith Heron, Gordon Russell
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 2 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
ICDCS
2006
IEEE
14 years 2 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
ICDM
2006
IEEE
135views Data Mining» more  ICDM 2006»
14 years 2 months ago
SAXually Explicit Images: Finding Unusual Shapes
Among the visual features of multimedia content, shape is of particular interest because humans can often recognize objects solely on the basis of shape. Over the past three decad...
Li Wei, Eamonn J. Keogh, Xiaopeng Xi
ICSEA
2006
IEEE
14 years 2 months ago
DuoTracker: Tool Support for Software Defect Data Collection and Analysis
— In today software industry defect tracking tools either help to improve an organization’s software development process or an individual’s software development process. No d...
Olusegun Akinwale, Sergiu M. Dascalu, Marcel Karam