Sciweavers

8177 search results - page 243 / 1636
» Detecting System Emulators
Sort
View
81
Voted
ICASSP
2010
IEEE
15 years 1 months ago
Cover song detection: From high scores to general classification
Existing cover song detection systems require prior knowledge of the number of cover songs in a test set in order to identify cover(s) to a reference song. We describe a system th...
Suman Ravuri, Daniel P. W. Ellis
ERSHOV
1993
Springer
15 years 5 months ago
Formal Derivation of an Error-Detecting Distributed Data Scheduler Using Changeling
Distributed database applications are a wide use of distributed systems. One of the major advantages of distributed database systems is the potential for achieving high availabili...
Hanan Lutfiyya, Bruce M. McMillin, Alan Su 0002
114
Voted
ICPR
2002
IEEE
15 years 5 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
SECON
2007
IEEE
15 years 7 months ago
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing
— Many asset tracking applications demand long-lived, low-cost, and continuous monitoring of a large number of items, which has posed a significant challenge to today’s RFID d...
Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong ...
AUSAI
2003
Springer
15 years 6 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho