Sciweavers

2236 search results - page 144 / 448
» Intrusion detection techniques and approaches
Sort
View
ICST
2008
IEEE
15 years 4 months ago
Pre-testing Flash Device Driver through Model Checking Techniques
Flash memory has become virtually indispensable in most mobile devices, such as mobile phones, digital cameras, mp3 players, etc. In order for mobile devices to successfully provi...
Moonzoo Kim, Yunja Choi, Yunho Kim, Hotae Kim
81
Voted
CONEXT
2009
ACM
14 years 11 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
BMCBI
2010
243views more  BMCBI 2010»
14 years 10 months ago
Comparative study of unsupervised dimension reduction techniques for the visualization of microarray gene expression data
Background: Visualization of DNA microarray data in two or three dimensional spaces is an important exploratory analysis step in order to detect quality issues or to generate new ...
Christoph Bartenhagen, Hans-Ulrich Klein, Christia...
ICRA
2007
IEEE
116views Robotics» more  ICRA 2007»
15 years 4 months ago
Using Boosted Features for the Detection of People in 2D Range Data
— This paper addresses the problem of detecting people in two dimensional range scans. Previous approaches have mostly used pre-defined features for the detection and tracking o...
Kai Oliver Arras, Óscar Martínez Moz...
ICRA
2007
IEEE
147views Robotics» more  ICRA 2007»
15 years 4 months ago
Classification-Based Wheel Slip Detection and Detector Fusion for Outdoor Mobile Robots
— This paper introduces a signal-recognition based approach for detecting autonomous mobile robot immobilization on outdoor terrain. The technique utilizes a support vector machi...
Chris C. Ward, Karl Iagnemma