Sciweavers

329 search results - page 65 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
ISCAS
2006
IEEE
169views Hardware» more  ISCAS 2006»
13 years 11 months ago
An Address-Event Image Sensor Network
We discuss an imaging architecture for sensor pixel in the ALOHA signals an event when a certain amount network applications, that employs a 32 x 32 Address-Event of photons are re...
Thiago Teixeira, Eugenio Culurciello, Andreas G. A...
ICNP
2007
IEEE
13 years 11 months ago
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs
— While the 802.11 power saving mode (PSM) and its enhancements can reduce power consumption by putting the wireless network interface (WNI) into sleep as much as possible, they ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
PR
2007
151views more  PR 2007»
13 years 4 months ago
Learning to display high dynamic range images
In this paper, we present a learning-based image processing technique. We have developed a novel method to map high dynamic range scenes to low dynamic range images for display in...
Guoping Qiu, Jiang Duan, Graham D. Finlayson
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
13 years 11 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
PERCOM
2006
ACM
14 years 4 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...