Sciweavers

1804 search results - page 204 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
169
Voted
WSCG
2004
212views more  WSCG 2004»
15 years 6 months ago
Face and Hands Segmentation in Color Images and Initial Matching with a Biomechanical Model
In this paper we describe a robust and efficient procedure to detect skin region with homogeneous color values in monocular indoor images. The mathematical background is a functio...
Jose Maria Buades Rubio, Manuel González Hi...
FIW
1998
130views Communications» more  FIW 1998»
15 years 6 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
101
Voted
CIC
2006
101views Communications» more  CIC 2006»
15 years 6 months ago
Non Blocking OVSF Codes Influence The Performance Of WCDMA System
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Shailendra Mishra, Nipur
IJCNLP
2005
Springer
15 years 10 months ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou
MOBISYS
2008
ACM
16 years 4 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park