Sciweavers

121 search results - page 20 / 25
» Anomalous trajectory patterns detection
Sort
View
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
TMA
2012
Springer
254views Management» more  TMA 2012»
12 years 3 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
IBPRIA
2009
Springer
14 years 12 days ago
Match Selection in Batch Mosaicing Using Mutual Information
Abstract. Large area photo-mosaics are widely used in many different applications such as optical mapping, panorama creation and autonomous vehicle navigation. When the trajectory...
Armagan Elibol, Nuno Gracias, Rafael García
KES
2008
Springer
13 years 7 months ago
Towards Natural Head Movement of Autonomous Speaker Agent
Autonomous Speaker Agent (ASA) is a graphically embodied animated agent capable of reading plain English text and rendering it in a form of speech, accompanied by appropriate, natu...
Marko Brkic, Karlo Smid, Tomislav Pejsa, Igor S. P...