Sciweavers

1237 search results - page 50 / 248
» Strictness and Totality Analysis
Sort
View
IEEEARES
2010
IEEE
15 years 3 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
ICDAR
1997
IEEE
15 years 2 months ago
UW-ISL Document Image Analysis Toolbox: An Experimental Environment
A document image analysis toolbox, including a collection of data structures and algorithms to suppbrt a variety of applications, is described in this paper. An experimental envir...
Jisheng Liang, Richard Rogers, Robert M. Haralick,...
CSFW
1994
IEEE
15 years 2 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
ICCAD
2004
IEEE
100views Hardware» more  ICCAD 2004»
15 years 6 months ago
A chip-level electrostatic discharge simulation strategy
This paper presents a chip-level charged device model (CDM) electrostatic discharge (ESD) simulation method. The chip-level simulation is formulated as a DC analysis problem. A ne...
Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, S...
COMPUTING
2007
122views more  COMPUTING 2007»
14 years 10 months ago
Error estimation for Bregman iterations and inverse scale space methods in image restoration
In this paper we consider error estimation for image restoration problems based on generalized Bregman distances. This error estimation technique has been used to derive convergen...
Martin Burger, E. Resmerita, Lin He