Sciweavers

326 search results - page 43 / 66
» Testing malware detectors
Sort
View
ISLPED
2006
ACM
140views Hardware» more  ISLPED 2006»
14 years 2 months ago
L-CBF: a low-power, fast counting bloom filter architecture
—An increasing number of architectural techniques rely on hardware counting bloom filters (CBFs) to improve upon the enegy, delay and complexity of various processor structures. ...
Elham Safi, Andreas Moshovos, Andreas G. Veneris
IWDW
2005
Springer
14 years 2 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
MLMI
2005
Springer
14 years 2 months ago
The TNO Speaker Diarization System for NIST RT05s Meeting Data
The TNO speaker speaker diarization system is based on a standard BIC segmentation and clustering algorithm. Since for the NIST Rich Transcription speaker dizarization evaluation m...
David van Leeuwen
ICRA
2003
IEEE
156views Robotics» more  ICRA 2003»
14 years 2 months ago
Biomimetic sensor suite for flight control of a micromechanical flying insect: design and experimental results
—Four prototypes of biomimetic sensors have been designed and implemented for flight control of a robotic flying insect. The ocelli use four photodiodes to detect changes in li...
Wei Chung Wu, Luca Schenato, Robert J. Wood, Ronal...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
14 years 2 months ago
MILA - Multilevel Immune Learning Algorithm
The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex i...
Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumd...