Sciweavers

8177 search results - page 441 / 1636
» Detecting System Emulators
Sort
View
PERVASIVE
2009
Springer
15 years 11 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
AMI
2009
Springer
15 years 11 months ago
Increased Robustness in Context Detection and Reasoning Using Uncertainty Measures: Concept and Application
This paper reports on a novel recurrent fuzzy classification method for robust detection of context activities in an environment using either single or distributed sensors. It als...
Martin Berchtold, Michael Beigl
APNOMS
2009
Springer
15 years 11 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 11 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
ICB
2009
Springer
122views Biometrics» more  ICB 2009»
15 years 11 months ago
A New Fake Iris Detection Method
Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
XiaoFu He, Yue Lu, Pengfei Shi