Sciweavers

452 search results - page 78 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
76
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
EyePhone: activating mobile phones with your eyes
As smartphones evolve researchers are studying new techniques to ease the human-mobile interaction. We propose EyePhone, a novel "hand-free" interfacing system capable o...
Emiliano Miluzzo, Tianyu Wang, Andrew T. Campbell
94
Voted
ANCS
2005
ACM
15 years 3 months ago
SSA: a power and memory efficient scheme to multi-match packet classification
New network applications like intrusion detection systems and packet-level accounting require multi-match packet classification, where all matching filters need to be reported. Te...
Fang Yu, T. V. Lakshman, Martin Austin Motoyama, R...
CHI
2008
ACM
15 years 10 months ago
Emotion rating from short blog texts
Being able to automatically perceive a variety of emotions from text alone has potentially important applications in CMC and HCI that range from identifying mood from online posts...
Alastair J. Gill, Darren Gergle, Robert M. French,...
DSN
2004
IEEE
15 years 1 months ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...