Sciweavers

8177 search results - page 500 / 1636
» Detecting System Emulators
Sort
View
128
Voted
DSN
2002
IEEE
15 years 9 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
ICRA
2000
IEEE
96views Robotics» more  ICRA 2000»
15 years 9 months ago
Fault Detection for Robot Manipulators with Parametric Uncertainty: A Prediction Error Based Approach
—In this paper, we introduce a new approach to fault detection for robot manipulators. The technique, which is based on the isolation of fault signatures via filtered torque pred...
Warren E. Dixon, Ian D. Walker, Darren M. Dawson, ...
ECOOPW
1998
Springer
15 years 9 months ago
Visual Detection of Duplicated Code
Code duplication is considered as bad practice that complicates the maintenance and evolution of software. Detecting duplicated code is a difficult task because of the large amoun...
Matthias Rieger, Stéphane Ducasse
CLOR
2006
15 years 8 months ago
The Trace Model for Object Detection and Tracking
We introduce a stochastic model to characterize the online computational process of an object recognition system based on a hierarchy of classifiers. The model is a graphical netwo...
Sachin Gangaputra, Donald Geman
FCCM
2004
IEEE
269views VLSI» more  FCCM 2004»
15 years 8 months ago
FPGA Based Network Intrusion Detection using Content Addressable Memories
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
Long Bu, John A. Chandy