Sciweavers

2269 search results - page 416 / 454
» Behavioral Intrusion Detection
Sort
View
AIR
2006
107views more  AIR 2006»
13 years 10 months ago
Just enough learning (of association rules): the TAR2 "Treatment" learner
Abstract. An over-zealous machine learner can automatically generate large, intricate, theories which can be hard to understand. However, such intricate learning is not necessary i...
Tim Menzies, Ying Hu
CCR
2006
85views more  CCR 2006»
13 years 10 months ago
Troubleshooting wireless mesh networks
Effective network troubleshooting is critical for maintaining efficient and reliable network operation. Troubleshooting is especially challenging in multi-hop wireless networks be...
Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 10 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
IVC
2008
223views more  IVC 2008»
13 years 10 months ago
Euclidean path modeling for video surveillance
In this paper, we address the issue of Euclidean path modeling in a single camera for activity monitoring in a multi-camera video surveillance system. The method consists of a pat...
Imran N. Junejo, Hassan Foroosh
CVIU
2007
121views more  CVIU 2007»
13 years 10 months ago
Background estimation under rapid gain change in thermal imagery
We consider detection of moving ground vehicles in airborne sequences recorded by a thermal sensor with automatic gain control, using an approach that integrates dense optic flow...
Hulya Yalcin, Robert T. Collins, Martial Hebert