Sciweavers

2929 search results - page 97 / 586
» Robust Hand Detection
Sort
View
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 3 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
119
Voted
ICC
2000
IEEE
111views Communications» more  ICC 2000»
15 years 7 months ago
Detection of Linear Modulations in the Presence of Strong Phase and Frequency Instabilities
—Noncoherent sequence detection algorithms, recently proposed by the authors, have a performance which approaches that of coherent detectors and are robust to phase and frequency...
Giulio Colavolpe, Riccardo Raheli, Giorgio Picchi
CONEXT
2008
ACM
15 years 4 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CEAS
2004
Springer
15 years 8 months ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
AVSS
2007
IEEE
15 years 8 months ago
A DSP-based system for the detection of vehicles parked in prohibited areas
In this paper, a system for automatic robust video surveillance is described and in particular its application to the problem of locating vehicles that stop in prohibited area is ...
Simone Boragno, Boghos A. Boghossian, James Black,...