Sciweavers

4307 search results - page 122 / 862
» Dynamic Spyware Analysis
Sort
View
133
Voted
BMVC
2010
15 years 20 days ago
Person Identification using Shadow Analysis
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
125
Voted
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
15 years 18 days ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
195
Voted
GAMEON
2009
15 years 12 days ago
Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online
At present, trajectory data, series of coordinate data traversed by moving objects, can be readily obtained due to the advent of positioning technologies. Clustering of trajectori...
Ruck Thawonmas, Junichi Oda, Kuan-Ta Chen
166
Voted
APSCC
2010
IEEE
14 years 9 months ago
ValySeC: A Variability Analysis Tool for Service Compositions Using VxBPEL
Nowadays applications are increasingly developed based on remote Web services and service composition has become a powerful novel development paradigm. Due to the fact that such a...
Chang-ai Sun, Tieheng Xue, Marco Aiello
166
Voted
TIM
2010
144views Education» more  TIM 2010»
14 years 9 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta