Sciweavers

1804 search results - page 193 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
AVBPA
2003
Springer
140views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images
A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Venu Govindaraju, Zhixin Shi, John Schneider
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 11 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
122
Voted
ICCBR
2009
Springer
15 years 11 months ago
Using Meta-reasoning to Improve the Performance of Case-Based Planning
Case-based planning (CBP) systems are based on the idea of reusing past successful plans for solving new problems. Previous research has shown the ability of meta-reasoning approac...
Manish Mehta, Santiago Ontañón, Ashw...
ICPR
2002
IEEE
15 years 9 months ago
Using Eigen-Deformations in Handwritten Character Recognition
Deformations in handwritten characters have classdependent tendencies. For example, characters of class “A” are often deformed by global slant transformation and never deforme...
Seiichi Uchida, Mohammad Asad Ronee, Hiroaki Sakoe
VTC
2010
IEEE
130views Communications» more  VTC 2010»
15 years 2 months ago
Performance of the Space-Time Block Coded DS-CDMA Uplink Employing Soft-Output ACO-Aided Multiuser Space-Time Detection and Iter
Abstract—In this treatise we propose a three-stage twin-transmitantenna assisted MultiUser (MU) Direct Sequence Code-Division Mulitple Access (DS-CDMA) system employing both a Un...
Chong Xu, Mohammed El-Hajjar, Robert G. Maunder, L...