Sciweavers

2330 search results - page 388 / 466
» A System for Object Class Detection
Sort
View
RSCTC
2010
Springer
178views Fuzzy Logic» more  RSCTC 2010»
15 years 1 months ago
Blind Music Timbre Source Isolation by Multi- resolution Comparison of Spectrum Signatures
Automatic indexing of music instruments for multi-timbre sounds is challenging, especially when partials from different sources are overlapping with each other. Temporal features, ...
Xin Zhang, Wenxin Jiang, Zbigniew W. Ras, Rory A. ...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 10 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
124
Voted
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
15 years 9 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...
LISA
2007
15 years 6 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
CCS
2008
ACM
15 years 6 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson