Sciweavers

56 search results - page 9 / 12
» Complete Monitors for Behavioral Contracts
Sort
View
CVPR
2008
IEEE
14 years 9 months ago
Kernel-based learning of cast shadows from a physical model of light sources and surfaces for low-level segmentation
In background subtraction, cast shadows induce silhouette distortions and object fusions hindering performance of high level algorithms in scene monitoring. We introduce a nonpara...
André Zaccarin, Nicolas Martel-Brisson
IV
2010
IEEE
150views Visualization» more  IV 2010»
13 years 5 months ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
DAC
2005
ACM
14 years 8 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
ATAL
1999
Springer
13 years 11 months ago
Towards a Distributed, Environment-Centered Agent Framework
Abstract. This paper will discuss the internal architecture for an agent framework called DECAF (Distributed Environment Centered Agent Framework). DECAF is a software toolkit for ...
John R. Graham, Keith Decker