Sciweavers

425 search results - page 69 / 85
» Audit
Sort
View
CN
1999
115views more  CN 1999»
13 years 7 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
TASLP
2002
60views more  TASLP 2002»
13 years 7 months ago
A psychoacoustic approach to combined acoustic echo cancellation and noise reduction
This paper presents and compares algorithms for combined acoustic echo cancellation and noise reduction for hands-free telephones. A structure is proposed, consisting of a conventi...
Stefan Gustafsson, Rainer Martin, Peter Jax, Peter...
TON
2002
138views more  TON 2002»
13 years 7 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
13 years 6 months ago
Improvement in listening capability for humanoid robot HRP-2
— This paper describes improvement of sound source separation for a simultaneous automatic speech recognition (ASR) system of a humanoid robot. A recognition error in the system ...
Toru Takahashi, Kazuhiro Nakadai, Kazunori Komatan...
INFOCOM
2010
IEEE
13 years 6 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier