Sciweavers

550 search results - page 34 / 110
» Complementarity of Error Detection Techniques
Sort
View
AUSAI
2003
Springer
14 years 27 days ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
HASE
2008
IEEE
13 years 7 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha
SEMCO
2009
IEEE
14 years 2 months ago
Detecting Attempts at Humor in Multiparty Meetings
Abstract—Systems designed for the automatic summarization of meetings have considered the propositional content of contributions by each speaker, but not the explicit techniques ...
Kornel Laskowski
CGI
2000
IEEE
14 years 2 days ago
Head Detection and Tracking by 2-D and 3-D Ellipsoid Fitting
A novel procedure for segmenting a set of scattered 3D data obtained from a head and shoulders multiview sequence is presented. The procedure consists of two steps. In the first ...
Nikos Grammalidis, Michael G. Strintzis
DSN
2006
IEEE
13 years 11 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman