Sciweavers

990 search results - page 131 / 198
» An efficient data structure for network anomaly detection
Sort
View
ICDCSW
2007
IEEE
14 years 2 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
ICICS
2003
Springer
14 years 1 months ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
IWIA
2005
IEEE
14 years 1 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
CVPR
2005
IEEE
14 years 10 months ago
A Statistical Field Model for Pedestrian Detection
This paper presents a new statistical model for detecting and tracking deformable objects such as pedestrians, where large shape variations induced by local shape deformation can ...
Ying Wu, Ting Yu, Gang Hua
AIR
2004
91views more  AIR 2004»
13 years 7 months ago
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applie
Abstract. Customer retention is an increasingly pressing issue in today's competitive environment. This paper proposes a personalized defection detection and prevention proced...
Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soun...