Sciweavers

2012 search results - page 215 / 403
» Lane-Change Detection Using a Computational Driver Model
Sort
View
152
Voted
CN
2007
179views more  CN 2007»
15 years 3 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ICCV
2007
IEEE
16 years 5 months ago
Retrieving actions in movies
We address recognition and localization of human actions in realistic scenarios. In contrast to the previous work studying human actions in controlled settings, here we train and ...
Ivan Laptev, Patrick Pérez
ICCAD
2003
IEEE
195views Hardware» more  ICCAD 2003»
15 years 8 months ago
Vectorless Analysis of Supply Noise Induced Delay Variation
The impact of power supply integrity on a design has become a critical issue, not only for functional verification, but also for performance verification. Traditional analysis has...
Sanjay Pant, David Blaauw, Vladimir Zolotov, Savit...
SIGMOD
1996
ACM
99views Database» more  SIGMOD 1996»
15 years 7 months ago
A Query Language for Multidimensional Arrays: Design, Implementation, and Optimization Techniques
While much recent research has focussed on extending databases beyond the traditional relational model, relatively little has been done to develop database tools for querying data...
Leonid Libkin, Rona Machlin, Limsoon Wong
125
Voted
CCS
2003
ACM
15 years 8 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson