Sciweavers

2236 search results - page 282 / 448
» Intrusion detection techniques and approaches
Sort
View
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
14 years 3 months ago
FreezeFrame: Compact Test Generation Using a Frozen Clock Strategy
Test application time is an important factor in the overall cost of VLSI chip testing. We present a new ATPG approach for generating compact test sequences for sequential circuits...
Yanti Santoso, Matthew C. Merten, Elizabeth M. Rud...
DSOM
2006
Springer
14 years 2 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
ICASSP
2007
IEEE
14 years 5 months ago
Unsupervised Audio Segmentation using Extended Baum-Welch Transformations
Audio segmentation has applications in a variety of contexts, such as audio information retrieval, automatic sound analysis, and as a pre-processing step in speech recognition. Ex...
Tara N. Sainath, Dimitri Kanevsky, Giridharan Iyen...
ICDAR
2009
IEEE
14 years 5 months ago
Document Analysis Support for the Manual Auditing of Elections
Recent developments have resulted in dramatic changes in the way elections are conducted, both in the United States and around the world. Well-publicized flaws in the security of...
Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang, Gan...
ETFA
2008
IEEE
14 years 5 months ago
Denial-of-service in automation systems
Security aspects of today’s automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryp...
Wolfgang Granzer, Christian Reinisch, Wolfgang Kas...