Sciweavers

886 search results - page 72 / 178
» From Detecting Errors to Automatically Correcting Them
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
14 years 2 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
FGR
2000
IEEE
112views Biometrics» more  FGR 2000»
14 years 10 days ago
Viewpoint-Invariant Learning and Detection of Human Heads
We present a method to learn models of human heads for the purpose of detection from different viewing angles. We focus on a model where objects are represented as constellations ...
Markus Weber, Wolfgang Einhäuser, Max Welling...
ICIS
2001
13 years 9 months ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang
DSN
2006
IEEE
14 years 2 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
DSN
2002
IEEE
14 years 27 days ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend