Sciweavers

4354 search results - page 438 / 871
» Matching Objects with Patterns
Sort
View
ETRICS
2006
15 years 8 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICPR
2010
IEEE
15 years 7 months ago
Cluster-Pairwise Discriminant Analysis
Pattern recognition problems often suffer from the larger intra-class variation due to situation variations such as pose, walking speed, and clothing variations in gait recognition...
Yasushi Makihara, Yasushi Yagi
USENIX
2004
15 years 5 months ago
High Performance X Servers in the Kdrive Architecture
The common usage patterns of 2D drivers for the X Window System have changed over time. New extensions such as Render and Composite are creating new demands for 2D rendering which...
Eric Anholt
AINA
2007
IEEE
15 years 4 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
CAL
2002
15 years 4 months ago
Worst-case Traffic for Oblivious Routing Functions
This paper presents an algorithm to find a worst-case traffic pattern for any oblivious routing algorithm on an arbitrary interconnection network topology. The linearity of channe...
Brian Towles, William J. Dally