Sciweavers

935 search results - page 70 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
EIT
2008
IEEE
13 years 9 months ago
Design and analysis of efficient reconfigurable wavelet filters
Abstract--Real-time image and multimedia processing applications such as video surveillance and telemedicine can have dynamic requirements of system latency, throughput, and power ...
Amit Pande, Joseph Zambreno
PERCOM
2010
ACM
13 years 6 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
ISCAS
2006
IEEE
122views Hardware» more  ISCAS 2006»
14 years 1 months ago
Design of a practical scheme for ultra wideband communication
—In the design of a packet-oriented impulse-radio UWB communication system, the main challenge at the receiver is to have a fast synchronization to the coded pulses, along with a...
Yiyin Wang, R. van Leuken, Alle-Jan van der Veen
ICCCN
2007
IEEE
14 years 2 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...