Sciweavers

1804 search results - page 207 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
TCOM
2008
66views more  TCOM 2008»
15 years 4 months ago
Lattice codes for amplified direct-detection optical systems
Theories of shaping for lattice codes have been developed for systems (optical or non-optical) using coherent detection with additive white Gaussian noise (AWGN) and for direct-det...
Wei Mao, Joseph M. Kahn
MLMI
2004
Springer
15 years 10 months ago
A Hierarchical System for Recognition, Tracking and Pose Estimation
This paper presents a new system for recognition, tracking and pose estimation of people in video sequences. It is based on the wavelet transform from the upper body part and uses ...
Philipp Zehnder, Esther Koller-Meier, Luc J. Van G...
PERVASIVE
2009
Springer
15 years 11 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
ICASSP
2008
IEEE
15 years 11 months ago
On persymmetric covariance matrices in adaptive detection
In the general area of radar detection, estimation of the clutter covariance matrix is an important point. This matrix commonly exhibits a persymmetric structure: this is the case...
Guilhem Pailloux, Philippe Forster, Jean Philippe ...
CAV
2008
Springer
113views Hardware» more  CAV 2008»
15 years 6 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg