Sciweavers

927 search results - page 80 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
GI
2009
Springer
15 years 2 months ago
A web service based approach for integrating statistics tools into an information system for experiment data
: Data management in the life sciences has evolved from simple storage of data to complex information systems providing additional functionalities like analysis and visualization c...
Dennis Heimann, Jens Nieschulze, Birgitta Kön...
IDEAL
2005
Springer
15 years 10 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
GI
2009
Springer
15 years 2 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
ISCAS
2007
IEEE
104views Hardware» more  ISCAS 2007»
15 years 10 months ago
Noncoherent Correlation-Based Communication Systems Choosing Different Chaotic Maps
— This paper proposes a new noncoherent detection system improved based on the differential chaos shift keying (DCSK) and the correlation delay shift keying (CDSK). In this schem...
Shintaro Arai, Yoshifumi Nishio

Publication
152views
15 years 7 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...