Sciweavers

65 search results - page 10 / 13
» Automatic Detection of SLS Violation Using Knowledge Based S...
Sort
View
ISBI
2006
IEEE
14 years 1 months ago
Automated detection of stable fracture points in computed tomography image sequences
Automated detection of stable fracture points in a sequence of Computed Tomography (CT) images is found to be a challenging task. In this paper, an innovative scheme for automatic...
Ananda S. Chowdhury, Suchendra M. Bhandarkar, Gaur...
NSPW
2004
ACM
14 years 26 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CODES
2007
IEEE
14 years 1 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
12 years 3 months ago
Coupled temporal scoping of relational facts
Recent research has made significant advances in automatically constructing knowledge bases by extracting relational facts (e.g., Bill Clinton-presidentOf-US) from large text cor...
Partha Pratim Talukdar, Derry Tanti Wijaya, Tom Mi...
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
14 years 8 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...