Sciweavers

1061 search results - page 188 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
14 years 3 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
IIHMSP
2006
IEEE
137views Multimedia» more  IIHMSP 2006»
14 years 3 months ago
Understanding Human Behavior Using a Language Modeling Approach
Visual analysis of human behavior has generated considerable interest in the field of computer vision because of the wide spectrum of potential applications. In this paper, we pre...
Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh S...
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Using partial information for face recognition and pose estimation
The main achievement of this work is the development of a new face recognition approach called Partial Principal Component Analysis (P2 CA), which exploits the novel concept of us...
Antonio Rama, Francesc Tarres, Davide Onofrio, Ste...
ICMCS
2005
IEEE
161views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Gender identification using frontal facial images
Computer vision and pattern recognition systems play an important role in our lives by means of automated face detection, face and gesture recognition, and estimation of gender an...
Amit Jain, Jeffrey Huang, Shiaofen Fang