Sciweavers

2236 search results - page 317 / 448
» Intrusion detection techniques and approaches
Sort
View
ICPR
2004
IEEE
14 years 10 months ago
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images
Feature subset selection, applied as a pre-processing step to machine learning, is valuable in dimensionality reduction, eliminating irrelevant data and improving classifier perfo...
Mithun Nagendra Prasad, Arcot Sowmya, Inge Koch
CGO
2009
IEEE
14 years 4 months ago
ESoftCheck: Removal of Non-vital Checks for Fault Tolerance
—As semiconductor technology scales into the deep submicron regime the occurrence of transient or soft errors will increase. This will require new approaches to error detection. ...
Jing Yu, María Jesús Garzarán...
SIGSOFT
2009
ACM
14 years 4 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
ICRA
2009
IEEE
160views Robotics» more  ICRA 2009»
14 years 4 months ago
Tracking of facial features to support human-robot interaction
— In this paper we present a novel methodology for detection and tracking of facial features like eyes, nose and mouth in image sequences. The proposed methodology is intended to...
Maria Pateraki, Haris Baltzakis, Polychronis Konda...
DSN
2008
IEEE
14 years 3 months ago
Trace-based microarchitecture-level diagnosis of permanent hardware faults
As devices continue to scale, future shipped hardware will likely fail due to in-the-field hardware faults. As traditional redundancy-based hardware reliability solutions that ta...
Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sah...