Sciweavers

1779 search results - page 313 / 356
» Secure Communications in ATM Networks
Sort
View
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 8 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
14 years 4 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
WEBI
2009
Springer
14 years 2 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
IFIP
2009
Springer
14 years 2 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér
AVSS
2006
IEEE
14 years 1 months ago
Multi-view Intelligent Vehicle Surveillance System
This paper presents a multi-view intelligent surveillance system used for the automatic tracking and monitoring of vehicles in a short-term parking lane. The system has the abilit...
Simon Denman, Clinton Fookes, Jamie Cook, Chris Da...