Sciweavers

2269 search results - page 411 / 454
» Behavioral Intrusion Detection
Sort
View
ACCV
1995
Springer
14 years 1 months ago
Developing an Active Observer
We present a binocular active vision system that can attend to and xate a moving target. Our system has an open and expandable design and it forms the rst steps of a long term e o...
Jan-Olof Eklundh, Tomas Uhlin, Peter Nordlund, Ats...
AVSS
2009
IEEE
14 years 1 months ago
Bayesian Bio-inspired Model for Learning Interactive Trajectories
—Automatic understanding of human behavior is an important and challenging objective in several surveillance applications. One of the main problems of this task consists in accur...
Alessio Dore, Carlo S. Regazzoni
ACHI
2008
IEEE
13 years 12 months ago
Specification for User Modeling with Self-Observing Systems
The complicated user interfaces and complex functionality of nowadays interactive products lead to a new class of failures: People do not understand their products and thus fail t...
Mathias Funk, Piet van der Putten, Henk Corporaal
APLAS
2008
ACM
13 years 12 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
CEAS
2008
Springer
13 years 12 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...