Sciweavers

8177 search results - page 325 / 1636
» Detecting System Emulators
Sort
View
99
Voted
IWDW
2004
Springer
15 years 9 months ago
Informed Detection Revisited
Abstract. Watermarking systems can employ either informed detection, where the original cover work is required, or blind detection, where it is not required. While early systems us...
Jeffrey A. Bloom, Matthew L. Miller
101
Voted
DISCEX
2003
IEEE
15 years 8 months ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
117
Voted
DSN
2002
IEEE
15 years 8 months ago
On the Placement of Software Mechanisms for Detection of Data Errors
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
Martin Hiller, Arshad Jhumka, Neeraj Suri
126
Voted
TIFS
2008
142views more  TIFS 2008»
15 years 3 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
133
Voted
ICASSP
2010
IEEE
14 years 10 months ago
Physical layer algorithm and hardware verification of MIMO relays using cooperative partial detection
Cooperative communication with multi-antenna relays can significantly increase the reliability and speed. However, cooperative MIMO detection would impose considerable complexity o...
Kiarash Amiri, Michael Wu, Melissa Duarte, Joseph ...