Sciweavers

271 search results - page 12 / 55
» Multi-target Detection by Multi-sensor Systems: A Comparison...
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
AISS
2010
111views more  AISS 2010»
14 years 7 months ago
PIXBAS "Pixel Based Offline Signature Verification"
Many systems are available to verify the signatures in bank cheques. In this paper, we verify the offline signatures by taking a boundary of the entire signature and do the pixel ...
Ashwin C. S., Harihar V., Karthick G., Karthik A.,...
CASCON
2004
129views Education» more  CASCON 2004»
14 years 11 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
ICIP
2005
IEEE
15 years 11 months ago
Lung nodules detection and classification
Image processing techniques and Computer Aided Diagnosis (CAD) systems have proved to be effective for the improvement of radiologists' diagnosis. In this paper an automatic ...
Paola Campadelli, Elena Casiraghi, Giorgio Valenti...
NBIS
2009
Springer
15 years 4 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena