Sciweavers

1424 search results - page 141 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ACIVS
2008
Springer
14 years 2 months ago
Video-Based Fall Detection in the Home Using Principal Component Analysis
This paper presents the design and real-time implementation of a fall-detection system, aiming at detecting fall incidents in unobserved home situations. The setup employs two fix...
Lykele Hazelhoff, Jungong Han, Peter H. N. de With
BTW
1997
Springer
112views Database» more  BTW 1997»
14 years 15 days ago
Database Application Programming with Versioned Complex Objects
Database systems as basis for CAD frameworks have to provide data management as well as transaction management facilities meeting the requirements of design applications. One of t...
Udo Nink, Norbert Ritter
HUC
2005
Springer
14 years 1 months ago
Scanning Objects in the Wild: Assessing an Object Triggered Information System
We describe the results of a field deployment of the AURA system which links online content to physical objects through machine readable tags. AURA runs on commercially available p...
A. J. Bernheim Brush, Tammara Combs Turner, Marc A...
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 8 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 3 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...