Sciweavers

2269 search results - page 394 / 454
» Behavioral Intrusion Detection
Sort
View
GLOBECOM
2009
IEEE
14 years 4 months ago
Cognitive Radio Enhancements for Legacy Networks Using Cooperative Diversity
Abstract— Two driving goals for cognitive radio (CR) technique are maximizing spectrum utilization and avoiding interference to primary users. In this paper, we deal with the CR ...
Zhanwei Sun, Ioannis Krikidis, J. Nicholas Laneman...
ICASSP
2009
IEEE
14 years 4 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
WMCSA
2009
IEEE
14 years 4 months ago
BALANCE: towards a usable pervasive wellness application with accurate activity inference
Technology offers the potential to objectively monitor people‘s eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long...
Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri...
UIC
2009
Springer
14 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICVS
2009
Springer
14 years 4 months ago
Learning Objects and Grasp Affordances through Autonomous Exploration
Abstract. We describe a system for autonomous learning of visual object representations and their grasp affordances on a robot-vision system. It segments objects by grasping and mo...
Dirk Kraft, Renaud Detry, Nicolas Pugeault, Emre B...