Sciweavers

2236 search results - page 113 / 448
» Intrusion detection techniques and approaches
Sort
View
TSP
2010
14 years 4 months ago
A non-iterative technique for phase noise ICI mitigation in packet-based OFDM systems
In this paper, a practical approach for detecting packet-based orthogonal frequency division multiplexing (OFDM) signals in the presence of phase noise is presented. An OFDM packe...
Payam Rabiei, Won Namgoong, Naofal Al-Dhahir
DBSEC
2006
131views Database» more  DBSEC 2006»
14 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
14 years 8 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
ECCV
2008
Springer
15 years 12 months ago
Contour Context Selection for Object Detection: A Set-to-Set Contour Matching Approach
Abstract. We introduce a shape detection framework called Contour Context Selection for detecting objects in cluttered images using only one exemplar. Shape based detection is inva...
Qihui Zhu, Liming Wang, Yang Wu, Jianbo Shi
RECOMB
2007
Springer
15 years 10 months ago
An Efficient and Accurate Graph-Based Approach to Detect Population Substructure
Currently, large-scale projects are underway to perform whole genome disease association studies. Such studies involve the genotyping of hundreds of thousands of SNP markers. One o...
Srinath Sridhar, Satish Rao, Eran Halperin