Sciweavers

1804 search results - page 331 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EFORENSICS
2009
Springer
14 years 3 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
VTC
2008
IEEE
139views Communications» more  VTC 2008»
14 years 3 months ago
Downlink Steered Space-Time Spreading For Multi-Carrier Transmission Over Frequency Selective Channels
— This paper presents a novel amalgam of Steered Space-Time Spreading (SSTS) and Orthogonal Frequency Division Multiple Access (OFDMA) designed for attaining both spatial diversi...
Nazar Sahal, Mohammed El-Hajjar, Lajos Hanzo
BMCBI
2010
130views more  BMCBI 2010»
13 years 9 months ago
MLPAinter for MLPA interpretation: an integrated approach for the analysis, visualisation and data management of Multiplex Ligat
Background: Multiplex Ligation-Dependent Probe Amplification (MLPA) is an application that can be used for the detection of multiple chromosomal aberrations in a single experiment...
Ronald van Eijk, Paul H. C. Eilers, Remco Natt&eac...
USENIX
2008
13 years 11 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
SAC
2010
ACM
13 years 9 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit