Sciweavers

8177 search results - page 1449 / 1636
» Detecting System Emulators
Sort
View
ICES
2005
Springer
176views Hardware» more  ICES 2005»
15 years 9 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
IFIP
2005
Springer
15 years 9 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
IH
2005
Springer
15 years 9 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
IJCNLP
2005
Springer
15 years 9 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
IWINAC
2005
Springer
15 years 9 months ago
Model Performance for Visual Attention in Real 3D Color Scenes
Abstract. Visual attention is the ability of a vision system, be it biological or artificial, to rapidly detect potentially relevant parts of a visual scene. The saliency-based mo...
Heinz Hügli, Timothée Jost, Nabil Ouer...
« Prev « First page 1449 / 1636 Last » Next »