Sciweavers

65 search results - page 6 / 13
» Multiple Classifier Systems under Attack
Sort
View
EUROMICRO
2004
IEEE
13 years 11 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CCS
2006
ACM
13 years 11 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
JNW
2008
79views more  JNW 2008»
13 years 7 months ago
Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture
This paper provides an overview of the technologies used in smart classrooms for distance education by classifying smart classrooms into four categories and discussing the type of ...
Davar Pishva, G. G. D. Nishantha
ICPR
2006
IEEE
14 years 8 months ago
Modification of the AdaBoost-based Detector for Partially Occluded Faces
While face detection seems a solved problem under general conditions, most state-of-the-art systems degrade rapidly when faces are partially occluded by other objects. This paper ...
Jie Chen, Shiguang Shan, Shengye Yan, Xilin Chen, ...
ICPADS
2007
IEEE
14 years 1 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies