Sciweavers

4511 search results - page 653 / 903
» Observation Based System Security
Sort
View
EAAI
2008
257views more  EAAI 2008»
15 years 4 months ago
Recognition of facial expressions using Gabor wavelets and learning vector quantization
Facial expression recognition has potential applications in different aspects of day-to-day life not yet realized due to absence of effective expression recognition techniques. Th...
Shishir Bashyal, Ganesh K. Venayagamoorthy
155
Voted
EUROSYS
2009
ACM
16 years 1 months ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
OOPSLA
2007
Springer
15 years 10 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
109
Voted
AFRICACRYPT
2008
Springer
15 years 10 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 10 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin