Sciweavers

2269 search results - page 387 / 454
» Behavioral Intrusion Detection
Sort
View
ICAI
2004
13 years 11 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...
TROB
2002
244views more  TROB 2002»
13 years 9 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...
ICDE
2010
IEEE
222views Database» more  ICDE 2010»
13 years 8 months ago
Finding Clusters in subspaces of very large, multi-dimensional datasets
Abstract— We propose the Multi-resolution Correlation Cluster detection (MrCC), a novel, scalable method to detect correlation clusters able to analyze dimensional data in the ra...
Robson Leonardo Ferreira Cordeiro, Agma J. M. Trai...
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 8 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
TIP
2010
107views more  TIP 2010»
13 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu