Sciweavers

3785 search results - page 666 / 757
» Immune System Based Intrusion Detection System
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor Networks
In this paper, we investigate the multi-channel MAC problem in underwater acoustic sensor networks. To reduce hardware cost, only one acoustic transceiver is often preferred on ev...
Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zaihan Jiang
SPIN
2010
Springer
15 years 2 months ago
Context-Enhanced Directed Model Checking
Directed model checking is a well-established technique to efficiently tackle the state explosion problem when the aim is to find error states in concurrent systems. Although dir...
Martin Wehrle, Sebastian Kupferschmid
ICDAR
2009
IEEE
15 years 2 months ago
Prototype Selection for Handwritten Connected Digits Classification
After the handwritten segmentation process, it is common to have connected digits. This is due to the great size and shape digit variations. In addition, the acquisition and the b...
Cristiano de Santana Pereira, George D. C. Cavalca...
144
Voted
ICIP
2009
IEEE
15 years 2 months ago
Semantic keyword extraction via adaptive text binarization of unstructured unsourced video
We propose a fully automatic method for summarizing and indexing unstructured presentation videos based on text extracted from the projected slides. We use changes of text in the ...
Michele Merler, John R. Kender
IEEEARES
2009
IEEE
15 years 2 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek