Sciweavers

1402 search results - page 165 / 281
» Detecting Change in Data Streams
Sort
View
PR
2011
13 years 15 hour ago
Detecting and discriminating behavioural anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempo...
Chen Change Loy, Tao Xiang, Shaogang Gong
RECONFIG
2009
IEEE
269views VLSI» more  RECONFIG 2009»
14 years 3 months ago
A 10 Gbps OTN Framer Implementation Targeting FPGA Devices
Abstract—Integrated circuits for very high-speed telecommunication protocols often use ASICs, due to their strict timing constraints. This scenario is changing, since modern FPGA...
Guilherme Guindani, Frederico Ferlini, Jeferson Ol...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
14 years 3 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
ICC
2007
IEEE
14 years 3 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha