Sciweavers

282 search results - page 31 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
PAISI
2007
Springer
15 years 5 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
MVA
2011
336views Computer Vision» more  MVA 2011»
14 years 6 months ago
In-vehicle camera traffic sign detection and recognition
: In this paper we discuss theoretical foundations and a practical realization of a real-time traffic sign detection, tracking and recognition system operating on board of a vehicl...
Andrzej Ruta, Fatih Porikli, Shintaro Watanabe, Yo...
ICDCS
1999
IEEE
15 years 3 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
ASPLOS
2011
ACM
14 years 2 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...
CVPR
2010
IEEE
15 years 7 months ago
On Detection of Multiple Object Instances using Hough Transforms
To detect multiple objects of interest, the methods based on Hough transform use non-maxima supression or mode seeking in order to locate and to distinguish peaks in Hough images....
Olga Barinova, Victor Lempitsky, Pushmeet Kohli