Sciweavers

2236 search results - page 392 / 448
» Intrusion detection techniques and approaches
Sort
View
PAKDD
2007
ACM
152views Data Mining» more  PAKDD 2007»
14 years 3 months ago
Spectral Clustering Based Null Space Linear Discriminant Analysis (SNLDA)
While null space based linear discriminant analysis (NLDA) obtains a good discriminant performance, the ability easily suffers from an implicit assumption of Gaussian model with sa...
Wenxin Yang, Junping Zhang
ACSC
2006
IEEE
14 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 3 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
ETS
2006
IEEE
110views Hardware» more  ETS 2006»
14 years 3 months ago
Deterministic Logic BIST for Transition Fault Testing
BIST is an attractive approach to detect delay faults due to its inherent support for at-speed test. Deterministic logic BIST (DLBIST) is a technique which was successfully applie...
Valentin Gherman, Hans-Joachim Wunderlich, Jü...
HPDC
2006
IEEE
14 years 3 months ago
Replicating Nondeterministic Services on Grid Environments
Replication is a technique commonly used to increase the availability of services in distributed systems, including grid and web services. While replication is relatively easy for...
Xianan Zhang, Flavio Junqueira, Matti A. Hiltunen,...