Sciweavers

1804 search results - page 183 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IROS
2008
IEEE
161views Robotics» more  IROS 2008»
15 years 11 months ago
Segmenting acoustic signal with articulatory movement using Recurrent Neural Network for phoneme acquisition
— This paper proposes a computational model for phoneme acquisition by infants. Human infants perceive speech sounds not as discrete phoneme sequences but as continuous acoustic ...
Hisashi Kanda, Tetsuya Ogata, Kazunori Komatani, H...
MVA
2007
179views Computer Vision» more  MVA 2007»
15 years 4 months ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
OSDI
2004
ACM
16 years 4 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
AAAI
1996
15 years 5 months ago
Qualitative Multiple-Fault Diagnosis of Continuous Dynamic Systems Using Behavioral Modes
Most model-based diagnosis systems, such as GDE and Sherlock, have concerned discrete, static systems such as logic circuits and use simple constraint propagation to detect incons...
Siddarth Subramanian, Raymond J. Mooney
WONS
2012
IEEE
14 years 2 days ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...