Sciweavers

2236 search results - page 273 / 448
» Intrusion detection techniques and approaches
Sort
View
ECCV
2010
Springer
14 years 2 months ago
Exploiting Repetitive Object Patterns for Model Compression and Completion
Many man-made and natural structures consist of similar elements arranged in regular patterns. In this paper we present an unsupervised approach for discovering and reasoning on re...
MR
2007
120views Robotics» more  MR 2007»
13 years 10 months ago
Advanced electronic prognostics through system telemetry and pattern recognition methods
Electronic Prognostics (EP) is a technique used in high-reliability and high-availability systems to actively and proactively detect faults, allowing the reduction of system downt...
Leon Lopez
ICIP
2005
IEEE
15 years 12 days ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ICSE
2003
IEEE-ACM
14 years 10 months ago
Improving Web Application Testing with User Session Data
Web applications have become critical components of the global information infrastructure, and it is important that they be validated to ensure their reliability. Therefore, many ...
Sebastian G. Elbaum, Srikanth Karre, Gregg Rotherm...
ICMCS
2005
IEEE
115views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Detector Design for Parametric Speech Watermarking
Parametric watermarking is effected by modifying the linear predictor coefficients of speech. In this work, the parameter noise is analyzed when watermarked speech is subjected t...
Aparna Gurijala, John R. Deller Jr.