Sciweavers

24 search results - page 4 / 5
» Intrusion Detection Testing and Benchmarking Methodologies
Sort
View
SMA
2008
ACM
203views Solid Modeling» more  SMA 2008»
13 years 7 months ago
Interactive continuous collision detection between deformable models using connectivity-based culling
We present an interactive algorithm for continuous collision detection between deformable models. We introduce two techniques to improve the culling efficiency and reduce the numb...
Min Tang, Sean Curtis, Sung-Eui Yoon, Dinesh Manoc...
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
14 years 21 days ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
EMSOFT
2005
Springer
14 years 1 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
TCSV
2008
166views more  TCSV 2008»
13 years 7 months ago
A Framework for Evaluating Stereo-Based Pedestrian Detection Techniques
Automated pedestrian detection, counting, and tracking have received significant attention in the computer vision community of late. As such, a variety of techniques have been inve...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
DATE
2010
IEEE
161views Hardware» more  DATE 2010»
14 years 25 days ago
Aging-resilient design of pipelined architectures using novel detection and correction circuits
—Time-dependent performance degradation due to transistor aging caused by mechanisms such as Negative Bias Temperature Instability (NBTI) and Hot Carrier Injection (HCI) is one o...
Hamed F. Dadgour, Kaustav Banerjee