Sciweavers

8177 search results - page 122 / 1636
» Detecting System Emulators
Sort
View
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 4 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
AIA
2006
13 years 11 months ago
A Static Images Based-System for Traffic Signs Detection
The localization and interpretation of traffic signs by means of a wise-artificial system is one of the several applications of the recognizing-image techniques. In this work we p...
Valentin Moreno, Agapito Ledezma, Araceli Sanch&ia...
WSCG
2003
223views more  WSCG 2003»
13 years 11 months ago
Optimizing Parameters of a Motion Detection System by Means of a Genetic Algorithm
Visual surveillance and monitoring have aroused interest in the computer video community for many years. The main task of these applications is to identify (and track) moving targ...
Alessandro Bevilacqua
BMCBI
2005
90views more  BMCBI 2005»
13 years 10 months ago
Text Detective: a rule-based system for gene annotation in biomedical texts
Background: The identification of mentions of gene or gene products in biomedical texts is a critical step in the development of text mining applications in biosciences. The compl...
Javier Tamames
PERCOM
2005
ACM
14 years 10 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...