Sciweavers

2236 search results - page 425 / 448
» Intrusion detection techniques and approaches
Sort
View
VRST
2009
ACM
14 years 2 months ago
Standalone edge-based markerless tracking of fully 3-dimensional objects for handheld augmented reality
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...
João Paulo S. M. Lima, Veronica Teichrieb, ...
ACSAC
2008
IEEE
14 years 2 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
CEC
2007
IEEE
14 years 2 months ago
Concerning the potential of evolutionary support vector machines
— Within the present paper, we put forward a novel hybridization between support vector machines and evolutionary algorithms. Evolutionary support vector machines consider the cl...
Ruxandra Stoean, Mike Preuss, Catalin Stoean, Dumi...
PPDP
2007
Springer
14 years 1 months ago
Mechanized metatheory model-checking
The problem of mechanically formalizing and proving metatheoretic properties of programming language calculi, type systems, operational semantics, and related formal systems has r...
James Cheney, Alberto Momigliano