Sciweavers

923 search results - page 56 / 185
» Improved Slide Attacks
Sort
View
IH
2001
Springer
15 years 4 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld
IJCNN
2000
IEEE
15 years 4 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
ICDM
2008
IEEE
121views Data Mining» more  ICDM 2008»
15 years 6 months ago
Fast and Memory Efficient Mining of High Utility Itemsets in Data Streams
Efficient mining of high utility itemsets has become one of the most interesting data mining tasks with broad applications. In this paper, we proposed two efficient one-pass algor...
Hua-Fu Li, Hsin-Yun Huang, Yi-Cheng Chen, Yu-Jiun ...
ICRA
2006
IEEE
166views Robotics» more  ICRA 2006»
15 years 5 months ago
Analysis, Design and Control of a Planar Micro-robot Driven by two Centripetal-force Actuators
– This paper presents the motion analysis, design and position control of a novel, low cost, sliding micro-robot, which is actuated by centripetal forces generated by robot mount...
P. Vartholomeos, Evangelos Papadopoulos
ISVLSI
2005
IEEE
115views VLSI» more  ISVLSI 2005»
15 years 5 months ago
High Speed Max-Log-MAP Turbo SISO Decoder Implementation Using Branch Metric Normalization
The authors present a turbo soft-in soft-out (SISO) decoder based on Max-Log maximum a posteriori (ML-MAP) algorithm implemented with sliding window (SW) method. A novel technique...
J. H. Han, Ahmet T. Erdogan, Tughrul Arslan