Sciweavers

8177 search results - page 308 / 1636
» Detecting System Emulators
Sort
View
161
Voted
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
252
Voted
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 6 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
89
Voted
DAC
2005
ACM
16 years 4 months ago
Automatic scenario detection for improved WCET estimation
Modern embedded applications usually have real-time constraints and they are implemented using heterogeneous multiprocessor systems-on-chip. Dimensioning a system requires accurat...
Stefan Valentin Gheorghita, Sander Stuijk, Twan Ba...
138
Voted
ISBI
2004
IEEE
16 years 4 months ago
Detection of Bronchovascular pairs on HRCT Lung Images Through Relational Learning
The identification of bronchovascular pairs on High Resolution Computer Tomography (HRCT) images provides valuable diagnostic information in patients with suspected airway disease...
Mithun Nagendra Prasad, Arcot Sowmya
GLOBECOM
2009
IEEE
15 years 10 months ago
How Much Training Is Needed for Iterative Multiuser Detection and Decoding?
Abstract—This paper studies large randomly spread directsequence code-division multiple-access system operating over a block fading multipath channel. Channel knowledge is obtain...
Mikko Vehkaperä, Keigo Takeuchi, Ralf R. M&uu...