Sciweavers

3785 search results - page 697 / 757
» Immune System Based Intrusion Detection System
Sort
View
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 6 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
INTERSPEECH
2010
14 years 6 months ago
Text-based unstressed syllable prediction in Mandarin
Recently, an increasing attention has been paid to Mandarin word stress which is important for improving the naturalness of speech synthesis. Most of the research on Mandarin spee...
Ya Li, Jianhua Tao, Meng Zhang, Shifeng Pan, Xiaoy...
JCIT
2010
131views more  JCIT 2010»
14 years 6 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 7 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
ICIP
2000
IEEE
16 years 1 months ago
Discovering Recurrent Visual Semantics in Consumer Photographs
We present techniques to semi-automatically discover Recurrent Visual Semantics (RVS) -the repetitive appearance of visually similar elements such as objects and scenes- in consum...
Alejandro Jaimes, Ana B. Benitez, Shih-Fu Chang, A...