Sciweavers

1031 search results - page 133 / 207
» codes 2004
Sort
View
ICVGIP
2004
15 years 2 days ago
Efficient Identification Based on Human Iris Patterns
This paper proposes a person identification system (PID), which works with non-illumination low-resolution eye images. Radial-Scan and threshold methods are used for Iris normaliz...
A. Chitra, R. Bremananth
LISA
2004
15 years 2 days ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
NIPS
2004
15 years 2 days ago
Inference, Attention, and Decision in a Bayesian Neural Architecture
We study the synthesis of neural coding, selective attention and perceptual decision making. We build a hierarchical neural architecture that implements Bayesian integration of no...
Angela J. Yu, Peter Dayan
NSDI
2004
15 years 2 days ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...
SEC
2004
15 years 2 days ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis