Sciweavers

2236 search results - page 395 / 448
» Intrusion detection techniques and approaches
Sort
View
ICCAD
2000
IEEE
104views Hardware» more  ICCAD 2000»
14 years 1 months ago
Diagnosis of Interconnect Faults in Cluster-Based FPGA Architectures
— Fault diagnosis has particular importance in the context of field programmable gate arrays (FPGAs) because faults can be avoided by reconfiguration at almost no real cost. Cl...
Ian G. Harris, Russell Tessier
ICDAR
1999
IEEE
14 years 1 months ago
Multifont Classification using Typographical Attributes
This paper introduces a multifont classification scheme to help recognition of multifont and multisize characters. It uses typographical attributes such as ascenders, descenders a...
Min-Chul Jung, Yong-Chul Shin, Sargur N. Srihari
ACSD
1998
IEEE
121views Hardware» more  ACSD 1998»
14 years 1 months ago
Identifying State Coding Conflicts in Asynchronous System Specifications Using Petri Net Unfoldings
State coding conflict detection is a fundamental part of synthesis of asynchronous concurrent systems from their specifications as Signal Transition Graphs (STGs), which are a spe...
Alex Kondratyev, Jordi Cortadella, Michael Kishine...
RIDE
1997
IEEE
14 years 1 months ago
Knowledge Discovery from Users Web-Page Navigation
We propose to detect users navigationpaths to the advantage of web-site owners. First, we explain the design and implementationof a profiler which captures client’s selected li...
Cyrus Shahabi, Amir M. Zarkesh, Jafar Adibi, Visha...
CVPR
1996
IEEE
14 years 1 months ago
Pattern Rejection
The e ciency of pattern recognition is particularly crucial in two scenarios; whenever there are a large number of classes to discriminate, and, whenever recognition must be perfo...
Simon Baker, Shree K. Nayar