Sciweavers

SRDS
1997
IEEE
13 years 8 months ago
Fault Detection Using Hints from the Socket Layer
This paper describes a fault detection mechanism that uses the error codes returned by the stream sockets to locate process failures. Since these errors are generated automaticall...
Nuno Neves, W. Kent Fuchs
ICMI
2000
Springer
138views Biometrics» more  ICMI 2000»
13 years 8 months ago
Multimodal Speaker Detection Using Input/Output Dynamic Bayesian Networks
Inferring users' actions and intentions forms an integral part of design and development of any human-computer interface. The presence of noisy and at times ambiguous sensory ...
Vladimir Pavlovic, Ashutosh Garg, James M. Rehg
GLOBECOM
2009
IEEE
13 years 8 months ago
Searching in the Delta Lattice: An Efficient MIMO Detection for Iterative Receivers
This paper introduces a new framework of the multiple-input multiple-output (MIMO) detection in iterative receivers. Unlike the conventional methods processing with symbol lattice,...
I-Wei Lai, Chun-Hao Liao, Ernst Martin Witte, Davi...
ICC
2007
IEEE
13 years 8 months ago
Routing for Emitter/Reflector Signal Detection in Wireless Sensor Network Systems
In this paper, we consider energy-efficient routing for detection in wireless sensor networks (WSNs). Energyefficient routing for WSNs has been intensely studied recently, but rout...
Yang Yang, Rick S. Blum
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
13 years 8 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...

Publication
179views
13 years 8 months ago
AutoSelect: What You Want Is What You Get Real-Time Processing of Visual Attention and Affect
While objects of our focus of attention (“where we are looking at”) and accompanying affective responses to those objects is part of our daily experience, little research exis...
Nikolaus Bee, Helmut Prendinger, Arturo Nakasone, ...
CCS
2007
ACM
13 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
HICSS
1994
IEEE
157views Biometrics» more  HICSS 1994»
13 years 8 months ago
A Protein Family Classification Method for Analysis of Large DNA Sequences
A method is described for identification and classification of proteins encoded in large DNA sequences. Previously, an automated system was introduced for the general detection of...
Steven Henikoff, Jorja G. Henikoff
ECCV
2010
Springer
13 years 8 months ago
Using Partial Edge Contour Matches for Efficient Object Category Localization
Abstract. We propose a method for object category localization by partially matching edge contours to a single shape prototype of the category. Previous work in this area either re...
Hayko Riemenschneider, Michael Donoser, and Horst ...
MIDDLEWARE
2009
Springer
13 years 9 months ago
How to Keep Your Head above Water While Detecting Errors
Today’s distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of err...
Ignacio Laguna, Fahad A. Arshad, David M. Grothe, ...