Sciweavers

8177 search results - page 226 / 1636
» Detecting System Emulators
Sort
View
86
Voted
ETRICS
2006
15 years 4 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
90
Voted
VTC
2010
IEEE
140views Communications» more  VTC 2010»
14 years 11 months ago
Iterative Soft-In Soft-Out Sphere Detection for 3GPP LTE
—3GPP LTE has become a hot topic in recent years. One of its main challenges is the computationally intense task of MIMO detection. This paper investigates MIMO detection methods...
Mohammad Ali Shah, Björn Mennenga, Gerhard Fe...
116
Voted
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Resource-adaptive multimedia analysis on stream mining systems
Large-scale multimedia semantic concept detection requires realtime identification of a set of concepts in streaming video or large image datasets. The potentially high data volum...
Deepak S. Turaga, Rong Yan, Olivier Verscheure, Br...
83
Voted
ANLP
1994
94views more  ANLP 1994»
15 years 2 months ago
Handling Japanese Homophone Errors in Revision Support System for Japanese Texts; REVISE
Japanese texts frequently suffer from the homophone errors caused by the KANA-KANJI conversion needed to input the text. It is critical, therefore, for Japanese revision support s...
Masahiro Oku
113
Voted
ACSAC
2004
IEEE
15 years 4 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das