Sciweavers

1804 search results - page 303 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CODES
2007
IEEE
14 years 3 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
CIVR
2007
Springer
227views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Video parsing based on head tracking and face recognition
In this paper, we describe a fully automatic video retrieval prototype system that uses an image or a video sequence of an interested identity as probe. The system is based on fac...
Pengxu Li, Haizhou Ai, Yuan Li, Chang Huang
ICITA
2005
IEEE
14 years 2 months ago
WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices
For increasing needs of positioning technology, easy and simple indoor positioning system is desired. Wireless LAN based positioning system is a major candidate of indoor position...
Teruaki Kitasuka, Kenji Hisazumi, Tsuneo Nakanishi...
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
14 years 2 months ago
Fuzzy Petri nets for monitoring and recovery
- In this paper, we propose a unitary tool for modeling and analysis of discrete event systems monitoring. Uncertain knowledge of such tasks asks specific reasoning and adapted fuz...
Daniel I. Racoceanu, Eugenia Minca, Noureddine Zer...
MA
1999
Springer
155views Communications» more  MA 1999»
14 years 1 months ago
JGram: Rapid Development of Multi-Agent Pipelines for Real-World Tasks
Many real-world tasks can be decomposed into pipelines of sequential operations (where subtasks may themselves be composed of one or more pipelines). JGram is a framework enabling...
Rahul Sukthankar, Antoine Brusseau, Ray Pelletier,...