Sciweavers

453 search results - page 13 / 91
» Controllability analysis for current profile control in toka...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ICIP
2007
IEEE
14 years 2 months ago
Face Recognition using a Fast Model Synthesis from a Profile and a Frontal View
In our previous work we presented a new 2D-3D mixed face recognition scheme called Partial Principal Component Analysis (P2 CA) [1]. The main contribution of P2 CA is that it uses...
Antonio Rama, Francesc Tarres
CDC
2010
IEEE
165views Control Systems» more  CDC 2010»
13 years 2 months ago
The behavior of linear time invariant RLC circuits
It is shown that just as we did for a purely resistive network [10], that circuit analysis is very simple if the elements are described not by potentials across and currents throug...
Erik I. Verriest, Jan C. Willems
NOMS
2000
IEEE
125views Communications» more  NOMS 2000»
14 years 1 days ago
A distributed resource controller for QoS applications
The Distributed Resource Controller (DRC) technology described in this paper provides a novel approach to interfacing applications with emerging network mechanisms to deliver Qual...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...