Sciweavers

1629 search results - page 130 / 326
» Infeasible Code Detection
Sort
View
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
15 years 3 months ago
A Linear Genetic Programming Approach to Intrusion Detection
Abstract. Page-based Linear Genetic Programming (GP) is proposed and implemented with two-layer Subset Selection to address a two-class intrusion detection classification problem a...
Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywo...
ICPR
2000
IEEE
15 years 2 months ago
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition
Automatic recovery of eye gestures from image sequences is one of the important topics for face recognition and model-based coding of videophone sequences. Usually complicated mod...
Ilse Ravyse, Hichem Sahli, Jan Cornelis, Marcel J....
TCOM
2008
82views more  TCOM 2008»
14 years 10 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
ASPLOS
2011
ACM
14 years 1 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
GLOBECOM
2009
IEEE
15 years 4 months ago
How Much Training Is Needed for Iterative Multiuser Detection and Decoding?
Abstract—This paper studies large randomly spread directsequence code-division multiple-access system operating over a block fading multipath channel. Channel knowledge is obtain...
Mikko Vehkaperä, Keigo Takeuchi, Ralf R. M&uu...