Sciweavers

8177 search results - page 208 / 1636
» Detecting System Emulators
Sort
View
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 1 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
80
Voted
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Online Doubletalk Detector Calibration for Acoustic Echo Cancellation in Videoconferencing Systems
This paper addresses the problem of doubletalk detector calibration for acoustic echo cancellers in hands-free environments such as videoconferencing. A statistical model of a rec...
James D. Gordy, Rafik A. Goubran
108
Voted
OSDI
2008
ACM
16 years 1 months ago
Transactional Flash
Transactional flash (TxFlash) is a novel solid-state drive (SSD) that uses flash memory and exports a transactional interface (WriteAtomic) to the higher-level software. The copy-...
Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong ...
88
Voted
OSDI
2002
ACM
16 years 1 months ago
Scale and Performance in the Denali Isolation Kernel
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Internet services on shared hardware. Denali...
Andrew Whitaker, Marianne Shaw, Steven D. Gribble
95
Voted
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
15 years 7 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann