Sciweavers

587 search results - page 94 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
NOSSDAV
2010
Springer
14 years 1 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
NETWORKING
2004
13 years 10 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
MVA
2007
179views Computer Vision» more  MVA 2007»
13 years 8 months ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
ISBI
2008
IEEE
14 years 9 months ago
FMRI brain activity and underlying hemodynamics estimation in a new Bayesian framework
The emerging functional MRI (Magnetic Resonance Imaging), fMRI, imaging modality was developed to obtain non-invasive information regarding the neural processes behind pre-determi...
David M. Afonso, João M. Sanches, Martin H....
MOBICOM
2010
ACM
13 years 9 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...