Sciweavers

4647 search results - page 394 / 930
» Composite Design Patterns
Sort
View
DATAMINE
2006
83views more  DATAMINE 2006»
15 years 4 months ago
Structural Hidden Markov Models Using a Relation of Equivalence: Application to Automotive Designs
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
Djamel Bouchaffra, Jun Tan
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 3 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
123
Voted
CSUR
2000
141views more  CSUR 2000»
15 years 3 months ago
On built-in test reuse in object-oriented framework design
: Object-oriented frameworks have extended reusability of software from code modules to architectural and domain information. This paper further extends software reusability from c...
Yingxu Wang, Dilip Patel, Graham King, Ian Court, ...
151
Voted
ICPR
2008
IEEE
16 years 5 months ago
EK-SVD: Optimized dictionary design for sparse representations
Sparse representations using overcomplete dictionaries are used in a variety of field such as pattern recognition and compression. However, the size of dictionary is usually a tra...
Raazia Mazhar, Paul D. Gader
DSN
2008
IEEE
15 years 10 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang