Sciweavers

1532 search results - page 137 / 307
» An analysis of additivity in OLAP systems
Sort
View
ECCV
2010
Springer
14 years 15 days ago
Automatic Learning of Background Semantics in Generic Surveilled Scenes
Advanced surveillance systems for behavior recognition in outdoor traffic scenes depend strongly on the particular configuration of the scenario. Scene-independent trajectory analy...
Carles Fernández, Jordi Gonzàlez, Xavier Roca
IPPS
2007
IEEE
14 years 3 months ago
VoroNet: A scalable object network based on Voronoi tessellations
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental...
Olivier Beaumont, Anne-Marie Kermarrec, Loris Marc...
ACCV
2006
Springer
14 years 3 months ago
Fast Image Replacement Using Multi-resolution Approach
We developed a system including two modules: the texture analysis module and the texture synthesis module. The analysis module is capable of analyzing an input image and performing...
Chih-Wei Fang, James Jenn-Jier Lien
AUSFORENSICS
2004
13 years 10 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
14 years 1 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine