Sciweavers

1804 search results - page 273 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
TWC
2008
85views more  TWC 2008»
13 years 8 months ago
Improved BDFE Using A Priori Information for Turbo Equalization
Abstract-- Turbo equalization improves communication system performance by iteratively exchanging information between soft-input soft-output (SISO) equalizer and SISO channel decod...
Jingxian Wu, Sang-Yick Leong, Kah-Ping Lee, Chengs...
BMVC
1998
13 years 10 months ago
Colour Profiling Using Multiple Colour Spaces
This paper presents an original method using colour histograms for flaw detection in automated industrial inspection. The colour histogram of an image is constructed by mapping th...
Nicola Duffy, Gerard Lacey
MOBIHOC
2005
ACM
14 years 8 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
ISSRE
2000
IEEE
14 years 1 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
ASC
2011
13 years 4 months ago
Autonomic fault-handling and refurbishment using throughput-driven assessment
A new paradigm for online EH regeneration using Genetic Algorithms (GAs) called Competitive Runtime Reconfiguration (CRR) is developed where performance is assessed based upon a b...
Ronald F. DeMara, Kening Zhang, Carthik A. Sharma