Sciweavers

2236 search results - page 139 / 448
» Intrusion detection techniques and approaches
Sort
View
ERSA
2006
197views Hardware» more  ERSA 2006»
14 years 11 months ago
A High Speed, Run Time Reconfigurable Image Acquisition processor for a Missile Approach Warning System
High frame rate video capture and image processing is an important capability for applications in defense and homeland security where incoming missiles must be detected in very sh...
Vinay Sriram, David Kearney
IWSSD
2000
IEEE
15 years 2 months ago
An Approach to Preserving Sufficient Correctness in Open Resource Coalitions
Most software that most people use most of the time needs only moderate assurance of fitness for its intended purpose. Unlike high-assurance software, where the severe consequence...
Orna Raz, Mary Shaw
ICIP
2002
IEEE
15 years 12 months ago
Detecting hidden messages using higher-order statistical models
Techniques for informationhidinghave become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become c...
Hany Farid
NETWORK
2007
234views more  NETWORK 2007»
14 years 9 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
WIESS
2000
14 years 11 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...