Sciweavers

2236 search results - page 289 / 448
» Intrusion detection techniques and approaches
Sort
View
APPROX
2004
Springer
88views Algorithms» more  APPROX 2004»
14 years 4 months ago
A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
Abstract. Motivated by an open problem recently suggested by Goldreich et al., we study truthful implementations of a random binary function supporting compound XOR queries over su...
Andrej Bogdanov, Hoeteck Wee
DFT
2002
IEEE
103views VLSI» more  DFT 2002»
14 years 3 months ago
Input Ordering in Concurrent Checkers to Reduce Power Consumption
A novel approach for reducing power consumption in checkers used for concurrent error detection is presented. Spatial correlations between the outputs of the circuit that drives t...
Kartik Mohanram, Nur A. Touba
WETICE
1999
IEEE
14 years 2 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
IJCAI
1997
13 years 12 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu

Publication
313views
13 years 11 months ago
Visual Surveillance: Dynamic Behavior Analysis at Multiple Levels
New cameras are installed daily all around the world. Hence it becomes increasingly important to develop methods for reducing the manual effort that is still required for video ana...
Michael D. Breitenstein