Sciweavers

1345 search results - page 43 / 269
» Reliable dissolve detection
Sort
View
ICAI
2008
14 years 11 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IJDSN
2006
136views more  IJDSN 2006»
14 years 9 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
DAC
2012
ACM
13 years 4 days ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
ICPR
2000
IEEE
15 years 2 months ago
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method
2. Obtain the gray-levelgradient magnitude. 3. Derive the threshold surface by deforming the original image gray-level surface. 4. The thresholdsurface interpolation. 5. Segmentati...
C. C. Leung, Francis H. Y. Chan, Paul C. K. Kwok, ...
VTC
2008
IEEE
120views Communications» more  VTC 2008»
15 years 4 months ago
Low Backhaul Distributed Detection Strategies for an Interference Limited Uplink Cellular System
— This paper deals with multiuser detection through base station cooperation in uplink interference limited scenarios. At high frequency reuse, each base station not only receive...
Shahid Khattak, Gerhard Fettweis