Sciweavers

459 search results - page 32 / 92
» Detecting Spam at the Network Level
Sort
View
ICPR
2010
IEEE
15 years 9 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
125
Voted
EPEW
2005
Springer
15 years 9 months ago
Performance Tuning of Failure Detectors in Wireless Ad-hoc Networks: Modelling and Experiments
Abstract. We consider wireless ad-hoc networks and implement failure detections mechanisms. These failure detectors provide elementary information for high level distributed algori...
Corine Marchand, Jean-Marc Vincent
114
Voted
ECCV
2006
Springer
16 years 5 months ago
An Integrated Model for Accurate Shape Alignment
In this paper, we propose a two-level integrated model for accurate face shape alignment. At the low level, the shape is split into a set of line segments which serve as the nodes ...
Lin Liang, Fang Wen, Xiaoou Tang, Ying-Qing Xu
147
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 3 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
139
Voted
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
16 years 16 days ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee