Sciweavers

8177 search results - page 459 / 1636
» Detecting System Emulators
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Decode-and-Forward Cooperative Relay with Multi-User Detection in Uplink CDMA Networks
Abstract— The use of multi-user detection (MUD) in a cooperative CDMA network is investigated for the uplink in synchronous CDMA systems. Suppose that, at any instant in time, pa...
Wan-Jen Huang, Yao-Win Hong, C. C. Jay Kuo
124
Voted
ICDIM
2007
IEEE
15 years 10 months ago
Equivalence detection using parse-tree normalization for math search
In recent years, efforts have begun to put math contents on the Web. As for other types of Web information, search capabilities should be provided to enable users to find what the...
Mohammed Shatnawi, Abdou Youssef
142
Voted
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
15 years 10 months ago
A Kalman filter for robust outlier detection
— In this paper, we introduce a modified Kalman filter that can perform robust, real-time outlier detection in the observations, without the need for parameter tuning. Robotic ...
Jo-Anne Ting, Evangelos Theodorou, Stefan Schaal
CCS
2007
ACM
15 years 10 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
161
Voted
ESAS
2007
Springer
15 years 10 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....