Sciweavers

467 search results - page 54 / 94
» Detecting errors using multi-cycle invariance information
Sort
View
IH
2007
Springer
15 years 4 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
BMCBI
2007
174views more  BMCBI 2007»
14 years 10 months ago
Normalization method for metabolomics data using optimal selection of multiple internal standards
Background: Success of metabolomics as the phenotyping platform largely depends on its ability to detect various sources of biological variability. Removal of platform-specific so...
Marko Sysi-Aho, Mikko Katajamaa, Laxman Yetukuri, ...
TSMC
2008
172views more  TSMC 2008»
14 years 9 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ICASSP
2010
IEEE
14 years 10 months ago
Multimodal similarity between musical streams for cover version detection
Expressing the similarity between musical streams is a challenging task as it involves the understanding of many factors which are most often blended into one information channel:...
Rémi Foucard, Jean-Louis Durrieu, Mathieu L...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 4 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...