Sciweavers

2236 search results - page 292 / 448
» Intrusion detection techniques and approaches
Sort
View
JGS
2006
113views more  JGS 2006»
13 years 10 months ago
Pattern based map comparisons
Map comparison techniques based on a pixel-by-pixel comparison are useful for many purposes, but fail to reveal important aspects of map similarities and differences. In contrast, ...
Roger White
ECCV
2006
Springer
15 years 9 days ago
Patch-Based Texture Edges and Segmentation
A novel technique for extracting texture edges is introduced. It is based on the combination of two ideas: the patch-based approach, and non-parametric tests of distributions. Our ...
Lior Wolf, Xiaolei Huang, Ian Martin, Dimitris N. ...
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
14 years 5 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
CISIS
2008
IEEE
14 years 4 months ago
Inferring the Function of Genes from Synthetic Lethal Mutations
—Techniques for detecting synthetic lethal mutations in double gene deletion experiments are emerging as powerful tool for analysing genes in parallel or overlapping pathways wit...
Oliver Ray, Christopher H. Bryant
GLOBECOM
2006
IEEE
14 years 4 months ago
A Lattice-Reduction-Aided Soft Detector for Multiple-Input Multiple-Output Channels
— Lattice basis reduction is a powerful technique that enables a hard-output detector for a multiple-input multiple-output channel to approach maximum-likelihood performance with...
David L. Milliner, John R. Barry