Sciweavers

502 search results - page 37 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
14 years 10 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
AHSWN
2006
206views more  AHSWN 2006»
13 years 9 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
RAS
2007
113views more  RAS 2007»
13 years 8 months ago
Visual novelty detection with automatic scale selection
This paper presents experiments with an autonomous inspection robot, whose task was to highlight novel features in its environment from camera images. The experiments used two dif...
Hugo Vieira Neto, Ulrich Nehmzow
VISUALIZATION
2003
IEEE
14 years 2 months ago
A Visual Exploration Process for the Analysis of Internet Routing Data
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information disse...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
ACCV
2006
Springer
14 years 3 months ago
Boosted Algorithms for Visual Object Detection on Graphics Processing Units
Nowadays, the use of machine learning methods for visual object detection has become widespread. Those methods are robust. They require an important processing power and a high mem...
Hicham Ghorayeb, Bruno Steux, Claude Laurgeau