Sciweavers

8177 search results - page 422 / 1636
» Detecting System Emulators
Sort
View
104
Voted
AIPS
1994
15 years 5 months ago
Synthesizing Protection Monitors from Causal Structure
Protection monitors synthesized from plan causal structure provide execution systems with information necessary to detect potential failures early during execution. By detecting e...
Glen A. Reece, Austin Tate
CN
2007
179views more  CN 2007»
15 years 4 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ICPR
2008
IEEE
15 years 10 months ago
Automatic face and facial features initialization for robust and accurate tracking
Face detection and tracking, through image sequences, are primary steps in many applications such as video surveillance, human computer interface, and expression analysis. Many cu...
Murad Al Haj, Javier Orozco, Jordi Gonzàlez...
ICC
2007
IEEE
15 years 10 months ago
Diversity Coherent Receivers for Optical Communication over the Clear Turbulent Atmosphere
—Optical communication through the atmosphere possibly enables high data rate communication. However, the optical field undergoes fades or outages due to air turbulence. Spatial ...
Etty J. Lee, Vincent W. S. Chan
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon