Sciweavers

7413 search results - page 1324 / 1483
» Using Specularities for Recognition
Sort
View
IH
2004
Springer
14 years 1 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
ISAAC
2004
Springer
153views Algorithms» more  ISAAC 2004»
14 years 1 months ago
Canonical Data Structure for Interval Probe Graphs
The class of interval probe graphs is introduced to deal with the physical mapping and sequencing of DNA as a generalization of interval graphs. The polynomial time recognition al...
Ryuhei Uehara
LSO
2004
Springer
14 years 1 months ago
Learning Software Maintenance Organizations
Abstract. Developing and maintaining software systems is a knowledge intensive task. One needs knowledge of the application domain of the software, the problem the system solves, t...
Kleiber D. de Sousa, Nicolas Anquetil, Káth...
NN
2004
Springer
111views Neural Networks» more  NN 2004»
14 years 1 months ago
The Analysis of Voice Quality in Speech Processing
Abstract. Voice quality has been defined as the characteristic auditory colouring of an individual's voice, derived from a variety of laryngeal and supralaryngeal features and...
Eric Keller
RAID
2004
Springer
14 years 1 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
« Prev « First page 1324 / 1483 Last » Next »