Sciweavers

927 search results - page 41 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
RAID
2001
Springer
15 years 8 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
CCGRID
2006
IEEE
15 years 10 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
ISCC
2002
IEEE
289views Communications» more  ISCC 2002»
15 years 9 months ago
Comparison of voice activity detection algorithms for VoIP
We discuss techniques for Voice Activity Detection (VAD) for Voice over Internet Protocol (VoIP). VAD aids in saving bandwidth requirement of a voice session thereby increasing th...
R. Venkatesha Prasad, Abhijeet Sangwan, H. S. Jama...
CAINE
2008
15 years 5 months ago
Scripted Artificially Intelligent Basic Online Tactical Simulation
For many years, introductory Computer Science courses have followed the same teaching paradigms. These paradigms utilize only simple console windows; more interactive approaches t...
Jesse D. Phillips, Roger V. Hoang, Joseph D. Mahsm...
ICCV
2007
IEEE
16 years 6 months ago
Detecting Illumination in Images
In this paper we present a surprisingly simple yet powerful method for detecting illumination--determining which pixels are lit by different lights--in images. Our method is based...
Clément Fredembach, Graham D. Finlayson, Ma...