Sciweavers

2027 search results - page 133 / 406
» On Performance Evaluation of Face Detection and Localization...
Sort
View
APNOMS
2008
Springer
13 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
ICDCS
2010
IEEE
13 years 9 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
DAC
2007
ACM
14 years 10 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
VTC
2010
IEEE
140views Communications» more  VTC 2010»
13 years 7 months ago
Iterative Soft-In Soft-Out Sphere Detection for 3GPP LTE
—3GPP LTE has become a hot topic in recent years. One of its main challenges is the computationally intense task of MIMO detection. This paper investigates MIMO detection methods...
Mohammad Ali Shah, Björn Mennenga, Gerhard Fe...
SENSYS
2005
ACM
14 years 2 months ago
Sympathy for the sensor network debugger
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...