Sciweavers

2236 search results - page 301 / 448
» Intrusion detection techniques and approaches
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Collaborative spectrum sensing from sparse observations using matrix completion for cognitive radio networks
— In cognitive radio, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary users). Collaborative spectrum sensing among the cognit...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
ICPR
2010
IEEE
13 years 10 months ago
Optimization of Target Objects for Natural Feature Tracking
— This paper investigates possible physical alterations of tracking targets to obtain improved 6DoF pose detection for a camera observing the known targets. We explore the influe...
Lukas Gruber, Stefanie Zollmann, Daniel Wagner, Di...
BMVC
2010
13 years 8 months ago
The Fastest Pedestrian Detector in the West
We demonstrate a multiscale pedestrian detector operating in near real time (5 fps on 640x480 images) with state-of-the-art detection performance. The computational bottleneck of ...
Piotr Dollár, Serge Belongie, Pietro Perona
CCS
2008
ACM
14 years 11 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
DAC
2010
ACM
13 years 5 months ago
Node addition and removal in the presence of don't cares
This paper presents a logic restructuring technique named node addition and removal (NAR). It works by adding a node into a circuit to replace an existing node and then removing t...
Yung-Chih Chen, Chun-Yao Wang