Sciweavers

2236 search results - page 138 / 448
» Intrusion detection techniques and approaches
Sort
View
ICTAI
1999
IEEE
15 years 2 months ago
Face Detection and Its Applications in Intelligent and Focused Image Retrieval
This paper presents a face detection technique and its applications in image retrieval. Even though this face detection method has relatively high false positives and low detectio...
Zhongfei Zhang, Rohini K. Srihari, Aibing Rao
ICIP
2005
IEEE
15 years 3 months ago
Combination of multiple extraction algorithms in the detection of facial features
Automated analysis of facial images for the estimation of the displayed expression is essential in the design of intuitive and accessible human computer interaction systems. In ex...
Spiros Ioannou, Manolis Wallace, Kostas Karpouzis,...
ASPLOS
2004
ACM
15 years 3 months ago
Fingerprinting: bounding soft-error detection latency and bandwidth
Recent studies have suggested that the soft-error rate in microprocessor logic will become a reliability concern by 2010. This paper proposes an efficient error detection techniqu...
Jared C. Smolens, Brian T. Gold, Jangwoo Kim, Baba...
ISSRE
2003
IEEE
15 years 3 months ago
A New Software Testing Approach Based on Domain Analysis of Specifications and Programs
Partition testing is a well-known software testing technique. This paper shows that partition testing strategies are relatively ineffective in detecting faults related to small sh...
Ruilian Zhao, Michael R. Lyu, Yinghua Min
AAECC
2010
Springer
123views Algorithms» more  AAECC 2010»
14 years 8 months ago
Algebraic change-point detection
Abstract Elementary techniques from operational calculus, differential algebra, and noncommutative algebra lead to a new approach for change-point detection, which is an important ...
Michel Fliess, Cédric Join, Mamadou Mboup