Sciweavers

502 search results - page 78 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
NETWORK
2007
234views more  NETWORK 2007»
13 years 8 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
IV
2007
IEEE
160views Visualization» more  IV 2007»
14 years 3 months ago
Targeted Projection Pursuit for Interactive Exploration of High- Dimensional Data Sets
High-dimensional data is, by its nature, difficult to visualise. Many current techniques involve reducing the dimensionality of the data, which results in a loss of information. ...
Joe Faith
ETFA
2008
IEEE
14 years 3 months ago
Denial-of-service in automation systems
Security aspects of today’s automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryp...
Wolfgang Granzer, Christian Reinisch, Wolfgang Kas...
ICCV
2003
IEEE
14 years 11 months ago
Counting People in Crowds with a Real-Time Network of Simple Image Sensors
Estimating the number of people in a crowded environment is a central task in civilian surveillance. Most vision-based counting techniques depend on detecting individuals in order...
Danny B. Yang, Héctor H. González-Ba...
AVI
2006
13 years 10 months ago
Implicit brushing and target snapping: data exploration and sense-making on large displays
During grouping tasks for data exploration and sense-making, the criteria are normally not well-defined. When users are bringing together data objects thought to be similar in som...
Xiaohua Sun, Patrick Chiu, Jeffrey Huang, Maribeth...