Sciweavers

103 search results - page 17 / 21
» Anomaly Detection through Registration
Sort
View
LCN
2007
IEEE
14 years 1 months ago
Efficient Multi-Dimensional Flow Correlation
—Flow correlation algorithms compare flows to determine similarity, and are especially useful and well studied for detecting flow chains through “stepping stone” hosts. Most ...
W. Timothy Strayer, Christine E. Jones, Beverly Sc...
JAIR
2010
181views more  JAIR 2010»
13 years 1 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
MOBISYS
2011
ACM
12 years 9 months ago
AccuLoc: practical localization of performance measurements in 3G networks
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Qiang Xu, Alexandre Gerber, Zhuoqing Morley Mao, J...
ECCV
2004
Springer
14 years 8 months ago
An Accuracy Certified Augmented Reality System for Therapy Guidance
Our purpose is to provide an augmented reality system for Radio-Frequency guidance that could superimpose a 3D model of the liver, its vessels and tumors (reconstructed from CT ima...
Stéphane Nicolau, Xavier Pennec, Luc Soler,...
IUI
2011
ACM
12 years 9 months ago
Design and validation of two-handed multi-touch tabletop controllers for robot teleoperation
Controlling the movements of mobile robots, including driving the robot through the world and panning the robot’s cameras, typically requires many physical joysticks, buttons, a...
Mark Micire, Munjal Desai, Jill L. Drury, Eric McC...