Sciweavers

290 search results - page 36 / 58
» Attack detection in time series for recommender systems
Sort
View
DAC
2008
ACM
13 years 10 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
ICIP
1999
IEEE
14 years 10 months ago
Low-Complexity Velocity Estimation in High-Speed Optical Doppler Tomography Systems
Abstract ? Optical Doppler Tomography (ODT) is a noninvasive 3-D optical interferometric imaging technique that measures static and dynamic structures in a sample. To obtain the dy...
Milos Milosevic, Wade Schwartzkopf, Thomas E. Miln...
SCAM
2008
IEEE
14 years 3 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
CDC
2008
IEEE
110views Control Systems» more  CDC 2008»
13 years 10 months ago
Topological identification in networks of dynamical systems
The paper deals with the problem of reconstructing the tree-like topological structure of a network of linear dynamical systems. A distance function is defined in order to evaluat...
Donatello Materassi, Giacomo Innocenti
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
14 years 8 days ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger