Sciweavers

1050 search results - page 132 / 210
» Two methods of authenticated positioning
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 7 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
DAC
1996
ACM
15 years 6 months ago
Modeling the Effects of Temporal Proximity of Input Transitions on Gate Propagation Delay and Transition Time
: While delay modeling of gates with a single switching input has received considerable attention, the case of multiple inputs switching in close temporal proximity is just beginni...
V. Chandramouli, Karem A. Sakallah
FGR
2004
IEEE
193views Biometrics» more  FGR 2004»
15 years 5 months ago
Face Recognition Using Ada-Boosted Gabor Features
Face representation based on Gabor features has attracted much attention and achieved great success in face recognition area for the advantages of the Gabor features. However, Gab...
Peng Yang, Shiguang Shan, Wen Gao, Stan Z. Li, Don...
PDPTA
2003
15 years 3 months ago
Queryball: A New Model for Querying in Immersive VR Systems
— In this paper, we propose a powerful and convenient querying model, "Queryball", for users to query in immersive VR systems. In immersive VR systems, users expect int...
Chiemi Watanabe, Ayumi Osugi, Yoshifumi Masunaga, ...
JCP
2008
121views more  JCP 2008»
15 years 1 months ago
Relation Organization of SOM Initial Map by Improved Node Exchange
The Self Organizing Map (SOM) involves neural networks, that learns the features of input data thorough unsupervised, competitive neighborhood learning. In the SOM learning algorit...
Tsutomu Miyoshi