Sciweavers

3651 search results - page 671 / 731
» Data Mining for Security Applications
Sort
View
MASCOTS
2010
13 years 11 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
ISCAPDCS
2001
13 years 11 months ago
Tolerating Transient Faults through an Instruction Reissue Mechanism
In this paper, we propose a fault-tolerant mechanism for microprocessors, which detects transient faults and recovers from them. There are two driving force to investigate fault-t...
Toshinori Sato, Itsujiro Arita
JRTIP
2008
300views more  JRTIP 2008»
13 years 10 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
JMM2
2006
149views more  JMM2 2006»
13 years 10 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux
JMM2
2007
122views more  JMM2 2007»
13 years 9 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma