Sciweavers

1629 search results - page 130 / 326
» Infeasible Code Detection
Sort
View
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
15 years 6 months ago
A Linear Genetic Programming Approach to Intrusion Detection
Abstract. Page-based Linear Genetic Programming (GP) is proposed and implemented with two-layer Subset Selection to address a two-class intrusion detection classification problem a...
Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywo...
ICPR
2000
IEEE
15 years 6 months ago
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition
Automatic recovery of eye gestures from image sequences is one of the important topics for face recognition and model-based coding of videophone sequences. Usually complicated mod...
Ilse Ravyse, Hichem Sahli, Jan Cornelis, Marcel J....
TCOM
2008
82views more  TCOM 2008»
15 years 1 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
ASPLOS
2011
ACM
14 years 5 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
GLOBECOM
2009
IEEE
15 years 8 months ago
How Much Training Is Needed for Iterative Multiuser Detection and Decoding?
Abstract—This paper studies large randomly spread directsequence code-division multiple-access system operating over a block fading multipath channel. Channel knowledge is obtain...
Mikko Vehkaperä, Keigo Takeuchi, Ralf R. M&uu...