Sciweavers

233 search results - page 32 / 47
» Information theoretic novelty detection
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 2 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
ACML
2009
Springer
14 years 3 months ago
Context-Aware Online Commercial Intention Detection
With more and more commercial activities moving onto the Internet, people tend to purchase what they need through Internet or conduct some online research before the actual transac...
Derek Hao Hu, Dou Shen, Jian-Tao Sun, Qiang Yang, ...
TSP
2010
13 years 3 months ago
Adaptive precoding for downstream crosstalk precancelation in DSL systems using sign-error feedback
The performance of many very high bit rate digital subscriber line (VDSL) systems is limited by the effects of crosstalk among the wires in a bundle. For the downstream, a precoder...
Jérôme Louveaux, Alle-Jan van der Vee...
USENIX
2007
13 years 11 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
TNN
2008
124views more  TNN 2008»
13 years 8 months ago
Just-in-Time Adaptive Classifiers - Part II: Designing the Classifier
Aging effects, environmental changes, thermal drifts, and soft and hard faults affect physical systems by changing their nature and behavior over time. To cope with a process evolu...
Cesare Alippi, Manuel Roveri