Sciweavers

5435 search results - page 100 / 1087
» Informed Detection Revisited
Sort
View
DIMVA
2007
15 years 5 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
CLEF
2011
Springer
14 years 4 months ago
Overview of the 3rd International Competition on Plagiarism Detection
Abstract This paper overviews eleven plagiarism detectors that have been de
Martin Potthast, Andreas Eiselt, Alberto Barr&oacu...
SIGIR
2010
ACM
15 years 4 months ago
Can search systems detect users' task difficulty?: some behavioral signals
In this paper, we report findings on how user behaviors vary in tasks with different difficulty levels as well as of different types. Two behavioral signals: document dwell time a...
Jingjing Liu, Chang Liu, Jacek Gwizdka, Nicholas J...
ISCAS
2007
IEEE
112views Hardware» more  ISCAS 2007»
15 years 10 months ago
Motion Detection Circuits for a Time-To-Travel Algorithm
—We describe a new motion detection circuit that extracts motion information based on a time-to-travel algorithm. The front-end photoreceptor adapts over 7 decades of background ...
Rico Moeckel, Shih-Chii Liu
IOLTS
2003
IEEE
97views Hardware» more  IOLTS 2003»
15 years 9 months ago
On-Line Error Detecting Constant Delay Adder
Fault tolerance requires the inclusion of redundant information. In this paper an on-line error detecting adder is presented in which the redundant information serves a dual purpo...
Whitney J. Townsend, Jacob A. Abraham, Parag K. La...