Sciweavers

260 search results - page 33 / 52
» Industry-scale duplicate detection
Sort
View
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 2 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
IEEEARES
2010
IEEE
15 years 2 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
ICIP
2010
IEEE
14 years 7 months ago
Detecting multiple copies in tampered images
Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a...
Edoardo Ardizzone, Alessandro Bruno, Giuseppe Mazz...
APNOMS
2006
Springer
15 years 1 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim
ICPR
2010
IEEE
14 years 8 months ago
FIND: A Neat Flip Invariant Descriptor
In this paper, we introduce a novel Flip INvariant Descriptor (FIND). FIND improves the degenerated performance resulted from image flips and reduces both space and time costs. F...
Xiaojie Guo, Xiaochun Cao