Sciweavers

2236 search results - page 403 / 448
» Intrusion detection techniques and approaches
Sort
View
ICML
2006
IEEE
14 years 10 months ago
Bayesian regression with input noise for high dimensional data
This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
IEEEARES
2010
IEEE
14 years 3 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
DATE
2009
IEEE
106views Hardware» more  DATE 2009»
14 years 3 months ago
Generation of compact test sets with high defect coverage
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
Xrysovalantis Kavousianos, Krishnendu Chakrabarty
ICRA
2009
IEEE
102views Robotics» more  ICRA 2009»
14 years 3 months ago
Safe fall: Humanoid robot fall direction change through intelligent stepping and inertia shaping
—Although fall is a rare event in the life of a humanoid robot, we must be prepared for it because its consequences are serious. In this paper we present a fall strategy which ra...
Seung-kook Yun, Ambarish Goswami, Yoshiaki Sakagam...
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
14 years 3 months ago
Simultaneous people tracking and localization for social robots using external laser range finders
—Robust localization of robots and reliable tracking of people are both critical requirements for the deployment of service robots in real-world environments. In crowded public s...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...