Sciweavers

230 search results - page 17 / 46
» An introduction to consistent graphs and their signal proces...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
AUIC
2006
IEEE
14 years 1 months ago
A wearable fatigue monitoring system: application of human-computer interaction evaluation
We developed a wearable fatigue monitoring system with a high-sensitivity 2-axis accelerometer and an on-board signal processing microcontroller. The proposed system measures fain...
Soichiro Matsushita, Ayumi Shiba, Kan Nagashima
ICASSP
2011
IEEE
12 years 11 months ago
Efficient stereo-to-multiview synthesis
From a rectified stereo image pair, the task of view synthesis is to generate images from any viewpoint along the baseline. The main difficulty of the problem is how to fill oc...
Ankit K. Jain, Lam C. Tran, Ramsin Khoshabeh, Truo...
CORR
2000
Springer
104views Education» more  CORR 2000»
13 years 7 months ago
ATLAS: A flexible and extensible architecture for linguistic annotation
We describe a formal model for annotating linguistic artifacts, from which we derive an application programming interface (API) to a tools for manipulating these annotations. The ...
Steven Bird, David Day, John S. Garofolo, John Hen...
ICASSP
2008
IEEE
14 years 2 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu