Sciweavers

1518 search results - page 211 / 304
» Cryptographic Test Correction
Sort
View
120
Voted
IPPS
2007
IEEE
15 years 7 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
90
Voted
IROS
2007
IEEE
189views Robotics» more  IROS 2007»
15 years 7 months ago
Differential evolution approach to the grid-based localization and mapping problem
— A new solution to the Simultaneous Localization and Modelling problem is presented. It is based on the stochastic search of solutions in the state space to the global localizat...
Luis Moreno, Santiago Garrido, Fernando Martin, Ma...
105
Voted
ISBI
2007
IEEE
15 years 7 months ago
Automatic Segmentation of Nuclei in 3d Microscopy Images of C.Elegans
Automatic segmentation of nuclei in 3D microscopy images is essential for many biological studies including high throughput analysis of gene expression level, morphology, and phen...
Fuhui Long, Hanchuan Peng, Eugene W. Myers
ISMVL
2007
IEEE
104views Hardware» more  ISMVL 2007»
15 years 7 months ago
Evaluation of Toggle Coverage for MVL Circuits Specified in the SystemVerilog HDL
Designing modern circuits comprised of millions of gates is a very challenging task. Therefore new directions are investigated for efficient modeling and verification of such syst...
Mahsan Amoui, Daniel Große, Mitchell A. Thor...
111
Voted
SECON
2007
IEEE
15 years 7 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao