Sciweavers

2096 search results - page 332 / 420
» Structured Parameter Elicitation
Sort
View
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 6 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
147
Voted
DSN
2005
IEEE
15 years 6 months ago
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network
This paper describes an experiment performed on Wide Area Network to assess and fairly compare the Quality of Service provided by a large family of failure detectors. Failure dete...
Lorenzo Falai, Andrea Bondavalli
ETS
2007
IEEE
128views Hardware» more  ETS 2007»
15 years 6 months ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
ICB
2007
Springer
183views Biometrics» more  ICB 2007»
15 years 6 months ago
Factorial Hidden Markov Models for Gait Recognition
Gait recognition is an effective approach for human identification at a distance. During the last decade, the theory of hidden Markov models (HMMs) has been used successfully in th...
Changhong Chen, Jimin Liang, Haihong Hu, Licheng J...
ESEM
2008
ACM
15 years 6 months ago
Iterative identification of fault-prone binaries using in-process metrics
Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...