Sciweavers

2236 search results - page 108 / 448
» Intrusion detection techniques and approaches
Sort
View
ISCAS
2003
IEEE
125views Hardware» more  ISCAS 2003»
15 years 3 months ago
A blind watermarking technique for multiple watermarks
We propose a blind watermarking technique to embed multiple watermarks simultaneously. It allows the use of correlated key to embed multiple watermarks. A dual-key system is used ...
Peter H. W. Wong, Oscar C. Au
PRL
2006
148views more  PRL 2006»
14 years 10 months ago
An agent based evolutionary approach to path detection for off-road vehicle guidance
This paper describes an ant colony optimization approach adopted to decide on road-borders to automatically guide a vehicle developed for the DARPA Grand Challenge 2004, available...
Alberto Broggi, Stefano Cattani
WWW
2009
ACM
15 years 10 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
TIT
1998
121views more  TIT 1998»
14 years 9 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor
IEEECSA
2009
14 years 7 months ago
A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos
Taekwondo Poomsae performance is a series of basic movements for offense and defense techniques. Despite the high popularity and long history of Taekwondo, there has been less effo...
Munther Abualkibash, James Gedney, Yongbom Kim, Je...