Sciweavers

462 search results - page 52 / 93
» Information visualization for an intrusion detection system
Sort
View
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
14 years 2 months ago
Moving obstacle detection in highly dynamic scenes
Abstract— We address the problem of vision-based multiperson tracking in busy pedestrian zones using a stereo rig mounted on a mobile platform. Specifically, we are interested i...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
IWCMC
2010
ACM
14 years 24 days ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
PAMI
2006
229views more  PAMI 2006»
13 years 7 months ago
A Coherent Computational Approach to Model Bottom-Up Visual Attention
Visual attention is a mechanism which filters out redundant visual information and detects the most relevant parts of our visual field. Automatic determination of the most visually...
Olivier Le Meur, Patrick Le Callet, Dominique Barb...
IVC
2007
115views more  IVC 2007»
13 years 7 months ago
Visual recognition of pointing gestures for human-robot interaction
In this paper, we present an approach for recognizing pointing gestures in the context of human–robot interaction. In order to obtain input features for gesture recognition, we ...
Kai Nickel, Rainer Stiefelhagen
TISSEC
2008
202views more  TISSEC 2008»
13 years 7 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning