Sciweavers

307 search results - page 50 / 62
» Detecting Abnormal Gait
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
TNC
2004
120views Education» more  TNC 2004»
13 years 11 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
BMCBI
2010
99views more  BMCBI 2010»
13 years 10 months ago
Different effects of the probe summarization algorithms PLIER and RMA on high-level analysis of Affymetrix exon arrays
Background: Alternative splicing is an important mechanism that increases protein diversity and functionality in higher eukaryotes. Affymetrix exon arrays are a commercialized pla...
Yi Qu, Fei He, Yuchen Chen
JPDC
2007
112views more  JPDC 2007»
13 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
ECCV
2008
Springer
14 years 11 months ago
Scene Segmentation for Behaviour Correlation
Abstract. This paper presents a novel framework for detecting abnormal pedestrian and vehicle behaviour by modelling cross-correlation among different co-occurring objects both loc...
Jian Li, Shaogang Gong, Tao Xiang