Sciweavers

8177 search results - page 327 / 1636
» Detecting System Emulators
Sort
View
112
Voted
SRDS
2000
IEEE
15 years 8 months ago
Detection of Livelocks in Communication Protocols by Means of a Polygon Time Structure
As has been shown, the polygon time structure overcomes the main limitations of the interval time structure, and allows to verify communication protocols, in which the explicit co...
Jerzy Brzezinski, Michal Sajkowski
150
Voted
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 7 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
158
Voted
ESANN
2004
15 years 4 months ago
Evolutionary Optimization of Neural Networks for Face Detection
For face recognition from video streams speed and accuracy are vital aspects. The first decision whether a preprocessed image region represents a human face or not is often made by...
Stefan Wiegand, Christian Igel, Uwe Handmann
ACSAC
2007
IEEE
15 years 10 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
AVBPA
2003
Springer
141views Biometrics» more  AVBPA 2003»
15 years 7 months ago
On the Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
Abstract. The accuracy of Automatic Fingerprint Identification Systems (AFIS) is dependent on many variables ranging from the quality of the friction skin surface itself, to the ab...
J. K. Schneider, C. E. Richardson, F. W. Kiefer, V...