Sciweavers

1448 search results - page 111 / 290
» Deadlock Detection in Distributed Systems
Sort
View
IWIA
2006
IEEE
14 years 4 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
CVPR
2005
IEEE
14 years 4 months ago
The Distinctiveness, Detectability, and Robustness of Local Image Features
We introduce a new method that characterizes typical local image features (e.g., SIFT [9], phase feature [3]) in terms of their distinctiveness, detectability, and robustness to i...
Gustavo Carneiro, Allan D. Jepson
DRM
2004
Springer
14 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
ICASSP
2011
IEEE
13 years 2 months ago
MIMO radar diversity with Neyman-Pearson signal detection in non-Gaussian circumstance with non-orthogonal waveforms
The diversity gain of a multiple-input multiple-output (MIMO) system adopting the Neyman-Pearson (NP) criterion is derived for a signal-present versus signal-absent scalar hypothe...
Qian He, Rick S. Blum
AAAI
2008
14 years 21 days ago
Anytime Local Search for Distributed Constraint Optimization
Most former studies of Distributed Constraint Optimization Problems (DisCOPs) search considered only complete search algorithms, which are practical only for relatively small prob...
Roie Zivan