Sciweavers

1457 search results - page 202 / 292
» Surrogate data: A novel approach to object detection
Sort
View
COMPSAC
2009
IEEE
15 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
DASC
2006
IEEE
15 years 1 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
SGP
2004
15 years 8 days ago
Two Algorithms for Fast Reclustering of Dynamic Meshed Surfaces
Numerous mesh algorithms such as parametrization, radiosity, and collision detection require the decomposition of meshes into a series of clusters. In this paper we present two no...
Nathan A. Carr, John C. Hart
FLOPS
2008
Springer
14 years 11 months ago
On-Demand Refinement of Dependent Types
Dependent types are useful for statically checking detailed specifications of programs and detecting pattern match or array bounds errors. We propose a novel approach to applicatio...
Hiroshi Unno, Naoki Kobayashi
INTERSPEECH
2010
14 years 4 months ago
Phone mismatch penalty matrices for two-stage keyword spotting via multi-pass phone recognizer
In this paper, we propose a novel approach to estimate three types of phone mismatch penalty matrices for two-state keyword spotting. When the output of a phone recognizer is give...
Chang Woo Han, Shin Jae Kang, Chul Min Lee, Nam So...