Sciweavers

2236 search results - page 306 / 448
» Intrusion detection techniques and approaches
Sort
View
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
14 years 4 months ago
Built-in Clock Skew System for On-line Debug and Repair
We present a low-cost on-line system for clock skew management in integrated circuits. Our Built-In Clock Skew System (BICSS) uses a centralized approach to identify, quantify and...
Atanu Chattopadhyay, Zeljko Zilic
ICDAR
2007
IEEE
14 years 4 months ago
Toponym Recognition in Scanned Color Topographic Maps
Topographic paper maps are a common support for geographical information. In the field of document analysis of this kind of support, this paper proposes an automatic approach to ...
Joachim Pouderoux, Jean-Christophe Gonzato, A. Per...
GECCO
2004
Springer
14 years 3 months ago
How to Overcome the Equivalent Mutant Problem and Achieve Tailored Selective Mutation Using Co-evolution
The use of Genetic Algorithms in evolution of mutants and test cases offers new possibilities in addressing some of the main problems of mutation testing. Most specifically the p...
Konstantinos Adamopoulos, Mark Harman, Robert M. H...
FGR
2002
IEEE
140views Biometrics» more  FGR 2002»
14 years 3 months ago
Hierarchical Wavelet Networks for Facial Feature Localization
We present a technique for facial feature localization using a two-level hierarchical wavelet network. The first level wavelet network is used for face matching, and yields an af...
Rogério Schmidt Feris, Jim Gemmell, Kentaro...
DSS
2006
76views more  DSS 2006»
13 years 10 months ago
Mining web navigations for intelligence
The Internet is one of the fastest growing areas of intelligence gathering. We present a statistical approach, called principal clusters analysis, for analyzing millions of user n...
Harris Wu, Michael D. Gordon, Kurt DeMaagd, Weiguo...