Sciweavers

433 search results - page 49 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
CRV
2004
IEEE
159views Robotics» more  CRV 2004»
13 years 11 months ago
Attending to Visual Motion: Localizing and Classifying Affine Motion Patterns
The Selective Tuning Model is a proposal for modelling visual attention in primates and humans. This paper describes ongoing research to include attention to motion stimuli within ...
John K. Tsotsos, Marc Pomplun, Julio C. Martinez-T...
CCS
2006
ACM
13 years 11 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
VISAPP
2008
13 years 9 months ago
AN Automated Visual Event Detection System for Cabled Observatory Video
The permanent presence of underwater cameras on cabled observatories, such as the Victoria Experimental Network Under the Sea (VENUS) and Eye-In-The-Sea (EITS) on Monterey Accelera...
Danelle E. Cline, Duane R. Edgington, Jér&o...
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...