Sciweavers

2269 search results - page 332 / 454
» Behavioral Intrusion Detection
Sort
View
CMS
2003
101views Communications» more  CMS 2003»
13 years 11 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
DEDS
2008
127views more  DEDS 2008»
13 years 10 months ago
Diagnosability Analysis of a Class of Hierarchical State Machines
This paper addresses the problem of Fault Detection and Isolation for a particular class of discrete event dynamical systems called Hierarchical Finite State Machines (HFSMs). A ne...
Andrea Paoli, Stéphane Lafortune
IVS
2008
124views more  IVS 2008»
13 years 10 months ago
Stories in GeoTime
is a powerful abstraction used by intelligence analysts to conceptualize threats and understand patterns as part of the analytical process. This paper demonstrates a system that d...
Ryan Eccles, Thomas Kapler, Robert Harper, William...
JDCTA
2008
128views more  JDCTA 2008»
13 years 10 months ago
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Haining Lee, Jaeil Park, Peom Park, Dongmin Shin
TCSV
2008
174views more  TCSV 2008»
13 years 10 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi