Sciweavers

1272 search results - page 88 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
RAID
2007
Springer
14 years 3 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
CC
2004
Springer
14 years 2 months ago
Region-Based Partial Dead Code Elimination on Predicated Code
Abstract. This paper presents the design, implementation and experimental evaluation of a practical region-based partial dead code elimination (PDE) algorithm on predicated code in...
Qiong Cai, Lin Gao 0002, Jingling Xue
PERVASIVE
2006
Springer
13 years 9 months ago
Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters
Abstract. Location-aware services can benefit from accurate and reliable indoor location tracking. The widespread adoption of 802.11x wireless LAN as the network infrastructure cre...
Li-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-na...
IPPS
2000
IEEE
14 years 1 months ago
Scalable Parallel Clustering for Data Mining on Multicomputers
This paper describes the design and implementation on MIMD parallel machines of P-AutoClass, a parallel version of the AutoClass system based upon the Bayesian method for determini...
D. Foti, D. Lipari, Clara Pizzuti, Domenico Talia
ICDAR
2009
IEEE
13 years 6 months ago
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition
This paper presents an off-line Arabic Handwriting recognition system based on the selection of different state of the art features and the combination of multiple Hidden Markov M...
Mahdi Hamdani, Haikal El Abed, Monji Kherallah, Ad...