Sciweavers

1804 search results - page 242 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
COGSCI
2004
75views more  COGSCI 2004»
14 years 10 months ago
Object recognition and Random Image Structure Evolution
We present a technique called Random Image Structure Evolution (RISE) for use in experimental investigations of high-level visual perception. Potential applications of RISE includ...
Javid Sadr, Pawan Sinha
101
Voted
MIDDLEWARE
2005
Springer
15 years 3 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
ICDE
1999
IEEE
107views Database» more  ICDE 1999»
15 years 11 months ago
Using Codewords to Protect Database Data from a Class of Software Errors
Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database...
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abra...
ISCA
2005
IEEE
104views Hardware» more  ISCA 2005»
15 years 3 months ago
Opportunistic Transient-Fault Detection
CMOS scaling increases susceptibility of microprocessors to transient faults. Most current proposals for transient-fault detection use full redundancy to achieve perfect coverage ...
Mohamed A. Gomaa, T. N. Vijaykumar
66
Voted
DATE
2006
IEEE
102views Hardware» more  DATE 2006»
15 years 4 months ago
Pseudorandom functional BIST for linear and nonlinear MEMS
Pseudorandom test techniques are widely used for measuring the impulse response (IR) for linear devices and Volterra kernels for nonlinear devices, especially in the acoustics dom...
Achraf Dhayni, Salvador Mir, Libor Rufer, Ahc&egra...