Sciweavers

2236 search results - page 336 / 448
» Intrusion detection techniques and approaches
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
CSB
2003
IEEE
150views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Algorithms for Bounded-Error Correlation of High Dimensional Data in Microarray Experiments
The problem of clustering continuous valued data has been well studied in literature. Its application to microarray analysis relies on such algorithms as -means, dimensionality re...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...
ISMAR
2003
IEEE
14 years 2 months ago
Fully Automated and Stable Registration for Augmented Reality Applications
We present a fully automated approach to camera registration for Augmented Reality systems. It relies on purely passive vision techniques to solve the initialization and realtime ...
Vincent Lepetit, Luca Vacchetti, Daniel Thalmann, ...
ISQED
2003
IEEE
83views Hardware» more  ISQED 2003»
14 years 2 months ago
Compact Dictionaries for Fault Diagnosis in BIST
We present a new technique for generating compact dictionaries for cause-effect diagnosis in BIST. This approach relies on the use of three compact dictionaries: (i) D1, containin...
Chunsheng Liu, Krishnendu Chakrabarty
PPOPP
2003
ACM
14 years 2 months ago
Compactly representing parallel program executions
Collecting a program’s execution profile is important for many reasons: code optimization, memory layout, program debugging and program comprehension. Path based execution pro...
Ankit Goel, Abhik Roychoudhury, Tulika Mitra