Sciweavers

8177 search results - page 261 / 1636
» Detecting System Emulators
Sort
View
DSN
2005
IEEE
15 years 8 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
AVSS
2003
IEEE
15 years 8 months ago
A Distributed Visual Surveillance System
We present a distributed vision-based surveillance system. The system acquires and processes grey level images through one or multiple Camera Units monitoring certain area(s) via ...
Xiaojing Yuan, Zehang Sun, Yaakov L. Varol, George...
103
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
Building Trust in Online Rating Systems Through Signal Modeling
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but difficult problem. Thi...
Yafei Yang, Yan Lindsay Sun, Jin Ren, Qing Yang
VTC
2006
IEEE
15 years 9 months ago
Successive Interference Cancellation in Clipped and Product Combining aided FFH Multi-User Systems
— In this contribution, we propose two successive interference cancellation (SIC) schemes for a fast frequency hopping (FFH) multiple access (MA) system using M-ary frequency shi...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo
RECSYS
2009
ACM
15 years 7 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley