Sciweavers

870 search results - page 99 / 174
» The failure detector abstraction
Sort
View
PEPM
2009
ACM
14 years 1 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
GLOBECOM
2009
IEEE
14 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
AWIC
2004
Springer
14 years 27 days ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
CIVR
2006
Springer
106views Image Analysis» more  CIVR 2006»
14 years 27 days ago
Video Retrieval Using High Level Features: Exploiting Query Matching and Confidence-Based Weighting
Abstract. Recent research in video retrieval has focused on automated, highlevel feature indexing on shots or frames. One important application of such indexing is to support preci...
Shi-Yong Neo, Jin Zhao, Min-Yen Kan, Tat-Seng Chua
CLEAR
2006
Springer
116views Biometrics» more  CLEAR 2006»
14 years 27 days ago
Multi-and Single View Multiperson Tracking for Smart Room Environments
Abstract. Simultaneous tracking of multiple persons in real world environments is an active research field and several approaches have been proposed, based on a variety of features...
Keni Bernardin, Tobias Gehrig, Rainer Stiefelhagen