Sciweavers

8177 search results - page 376 / 1636
» Detecting System Emulators
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 10 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
ICIAR
2009
Springer
15 years 10 months ago
Detection of Linear Structures in Remote-Sensed Images
Over the past decades, considerable progress had been made in developing automatic image interpretation tools for remote sensing. There is, however, still a gap between the require...
Rui Gao, Walter F. Bischof
GLOBECOM
2008
IEEE
15 years 10 months ago
Impact of Signaling Schemes on Iterative Linear Minimum-Mean-Square-Error Detection
—In this paper, we study the iterative detection problem for a coded system with multi-ary modulation. We show that, with iterative linear minimum-mean-square-error (LMMSE) detec...
Li Ping, Jun Tong, Xiaojun Yuan, Qinghua Guo
IROS
2007
IEEE
144views Robotics» more  IROS 2007»
15 years 10 months ago
Faster and more accurate face detection on mobile robots using geometric constraints
— We develop a framework to allow generic object detection algorithms to exploit geometric information commonly available to robot vision systems. Robot systems take pictures wit...
Michael Dixon, Frederick Heckel, Robert Pless, Wil...
AIMS
2007
Springer
15 years 10 months ago
Improving Anomaly Detection Event Analysis Using the EventRank Algorithm
Abstract. We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is ...
Kyrre M. Begnum, Mark Burgess