Sciweavers

2997 search results - page 508 / 600
» Fuzzy robustness analysis
Sort
View
DIMVA
2006
13 years 10 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
DICTA
2003
13 years 10 months ago
Face Recognition Based on Multiple Region Features
For face recognition, face feature selection is an important step. Better features should result in better performance. This paper describes a robust face recognition algorithm usi...
Jiaming Li, Geoff Poulton, Ying Guo, Rong-yu Qiao
USENIX
2001
13 years 10 months ago
Scalable Linux Scheduling
For most of its existence, Linux has been used primarily as a personal desktop operating system. Yet, in recent times, its use as a cost-efficient alternative to commercial operat...
Stephen Molloy, Peter Honeyman
SSWMC
2004
13 years 10 months ago
An informed synchronization scheme for audio data hiding
This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio d...
Alejandro LoboGuerrero, Patrick Bas, Joel Lienard
WSCG
2004
264views more  WSCG 2004»
13 years 10 months ago
Image Registration Exploiting Five-Point Coplanar Perspective Invariant and Maximum-Curvature Point
Image registrations have been a subject of extensive study over the last decade. They appear in numerous applications including Computer Vision, Pattern Recognition, Medical Image...
Parichart Putjarupong, Chuchart Pintavirooj, Witha...