Sciweavers

1265 search results - page 120 / 253
» Better Burst Detection
Sort
View
NDSS
2009
IEEE
14 years 4 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
SCAM
2007
IEEE
14 years 4 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan
TASE
2007
IEEE
14 years 4 months ago
Evaluation of SAT-based Bounded Model Checking of ACTL Properties
Bounded model checking (BMC) based on SAT has been introduced as a complementary method to BDD-based symbolic model checking of LTL and ACTL properties in recent years. For genera...
Yanyan Xu, Wei Chen, Liang Xu, Wenhui Zhang
CVPR
2007
IEEE
15 years 6 days ago
Tensor Canonical Correlation Analysis for Action Classification
We introduce a new framework, namely Tensor Canonical Correlation Analysis (TCCA) which is an extension of classical Canonical Correlation Analysis (CCA) to multidimensional data ...
Tae-Kyun Kim, Shu-Fai Wong, Roberto Cipolla
CVPR
2007
IEEE
15 years 6 days ago
Capturing People in Surveillance Video
This paper presents reliable techniques for detecting, tracking, and storing keyframes of people in surveillance video. The first component of our system is a novel face detector ...
Rogerio Feris, Ying-li Tian, Arun Hampapur