Sciweavers

1804 search results - page 185 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ISMVL
2003
IEEE
101views Hardware» more  ISMVL 2003»
15 years 9 months ago
Bidirectional Data Transfer Based Asynchronous VLSI System Using Multiple-Valued Current Mode Logic
A new asynchronous data transfer scheme using multiple-valued 2-color 1-phase coding, called a bidirectional data transfer scheme, is proposed for a highperformance and low-power ...
Takahiro Hanyu, Tomohiro Takahashi, Michitaka Kame...
GLVLSI
2003
IEEE
145views VLSI» more  GLVLSI 2003»
15 years 9 months ago
Using dynamic domino circuits in self-timed systems
We introduce a simple hierarchical design technique for using dynamic domino circuits to build high-performance self-timed data path circuits. We wrap the dynamic domino circuit i...
Jung-Lin Yang, Erik Brunvand
ICCV
2007
IEEE
16 years 6 months ago
Trajectory Rectification and Path Modeling for Video Surveillance
Path modeling for video surveillance is an active area of research. We address the issue of Euclidean path modeling in a single camera for activity monitoring in a multicamera vid...
Imran N. Junejo, Hassan Foroosh
ISDA
2009
IEEE
15 years 11 months ago
Similarity Analysis of Protein Binding Sites: A Generalization of the Maximum Common Subgraph Measure Based on Quasi-Clique Dete
—Protein binding sites are often represented by means of graphs capturing their most important geometrical and physicochemical properties. Searching for structural similarities a...
Imen Boukhris, Zied Elouedi, Thomas Fober, Marco M...
DOCENG
2009
ACM
15 years 2 months ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...