Sciweavers

2513 search results - page 123 / 503
» Experiments on Eigenfaces Robustness
Sort
View
CCS
2009
ACM
14 years 4 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
NDSS
2009
IEEE
14 years 4 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Robust Method for TV Logo Tracking in Video Streams
Most broadcast stations rely on TV logos to claim video content ownership or visually distinguish the broadcast from the interrupting commercial block. Detecting and tracking a TV...
Jinqiao Wang, Lingyu Duan, Zhenglong Li, Jing Liu,...
ASPDAC
2006
ACM
116views Hardware» more  ASPDAC 2006»
14 years 4 months ago
A robust detailed placement for mixed-size IC designs
— The rapid increase in IC design complexity and wide-spread use of intellectual-property (IP) blocks have made the so-called mixed-size placement a very important topic in recen...
Jason Cong, Min Xie
MOBICOM
2006
ACM
14 years 4 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...