Sciweavers

517 search results - page 75 / 104
» Adaptive Threshold Masking
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
13 years 9 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
ESWA
2006
182views more  ESWA 2006»
13 years 9 months ago
Improved route planning and scheduling of waste collection and transport
The collection of waste is a highly visible and important municipal service that involves large expenditures. Waste collection problems are, however, one of the most difficult ope...
Teemu Nuortio, Jari Kytöjoki, Harri Niska, Ol...
PAA
2000
13 years 9 months ago
Using Renyi's Information and Wavelets for Target Detection: An Application to Mammograms
Abstract: In this paper we present a multi-scale method for the detection of small targets embedded in noisy background. The multiscale representation is built using a weighted und...
Giuseppe Boccignone, Angelo Chianese, Antonio Pica...
HIS
2009
13 years 7 months ago
An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering
In this paper, we propose a vector quantization (VQ) -based information hiding scheme that cluster the VQ codeowrds according the codewords' relation on Voronoi Diagram (VD). ...
Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li
ICIP
2009
IEEE
13 years 7 months ago
Shadow detection in video surveillance by maximizing agreement between independent detectors
This paper starts from the idea of automatically choosing the appropriate thresholds for a shadow detection algorithm. It is based on the maximization of the agreement between two...
Juan C. SanMiguel, José M. Martinez