Sciweavers

8177 search results - page 393 / 1636
» Detecting System Emulators
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 9 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
CORR
2010
Springer
141views Education» more  CORR 2010»
15 years 4 months ago
Termination Detection of Local Computations
Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the proble...
Emmanuel Godard, Yves Métivier, Gerard Tel
GLOBECOM
2008
IEEE
15 years 10 months ago
A Second Order Statistics Based Algorithm for Blind Recognition of OFDM Based Systems
— An opportunistic radio is a radio able to detect the spectrum unused bands, and to adapt its transmission parameters in order to transmit within these free bands. An opportunis...
Abdelaziz Bouzegzi, Pierre Jallon, Philippe Ciblat
MICCAI
2005
Springer
16 years 4 months ago
Automatic Detection and Segmentation of Robot-Assisted Surgical Motions
Robotic surgical systems such as Intuitive Surgical's da Vinci system provide a rich source of motion and video data from surgical procedures. In principle, this data can be u...
Henry C. Lin, Izhak Shafran, Todd E. Murphy, Allis...
PERCOM
2007
ACM
16 years 3 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...