Sciweavers

1448 search results - page 267 / 290
» Genetic Algorithms for Dynamic Test Data Generation
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ARITH
2007
IEEE
14 years 4 months ago
P6 Binary Floating-Point Unit
The floating point unit of the next generation PowerPC is detailed. It has been tested at over 5 GHz. The design supports an extremely aggressive cycle time of 13 FO4 using a tech...
Son Dao Trong, Martin S. Schmookler, Eric M. Schwa...
ISMIS
2005
Springer
14 years 3 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
PVLDB
2010
135views more  PVLDB 2010»
13 years 8 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...
3DPVT
2004
IEEE
141views Visualization» more  3DPVT 2004»
14 years 1 months ago
Exploitation of 3D Images for Face Authentication Under Pose and Illumination Variations
An appearance-based face authentication system integrating 2D color or intensity images and 3D data is presented in this paper. The proposed system is based on a low-cost 3D and c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...