Sciweavers

892 search results - page 61 / 179
» Coordinated Scan Detection
Sort
View
MVA
2007
186views Computer Vision» more  MVA 2007»
13 years 9 months ago
Probabilistic-topological calibration of widely distributed camera networks
Abstract We propose a method for estimating the topology of distributed cameras, which can provide useful information for multi-target tracking in a wide area, without object ident...
Norimichi Ukita
ICCV
2009
IEEE
13 years 7 months ago
Dense 3D reconstruction method using a single pattern for fast moving object
Dense 3D reconstruction of extremely fast moving objects could contribute to various applications such as body structure analysis and accident avoidance and so on. The actual case...
Ryusuke Sagawa, Yuichi Ota, Yasushi Yagi, Ryo Furu...
ACSAC
2002
IEEE
14 years 2 months ago
Digging For Worms, Fishing For Answers
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle,...
Florian P. Buchholz, Thomas E. Daniels, James P. E...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
14 years 2 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
UIST
1993
ACM
14 years 2 months ago
SpeechSkimmer: Interactively Skimming Recorded Speech
Skimming or browsing audio recordings is much more difficult than visually scanning a document because of the temporal nature of audio. By exploiting properties of spontaneous spe...
Barry Arons