Sciweavers

462 search results - page 53 / 93
» Information visualization for an intrusion detection system
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
VISUAL
2007
Springer
14 years 1 months ago
Automatic Detection and Recognition of Players in Soccer Videos
An application for content-based annotation and retrieval of videos can be found in the sport domain, where videos are annotated in order to produce short summaries for news and sp...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
ISBI
2004
IEEE
14 years 8 months ago
Detection of Bronchovascular pairs on HRCT Lung Images Through Relational Learning
The identification of bronchovascular pairs on High Resolution Computer Tomography (HRCT) images provides valuable diagnostic information in patients with suspected airway disease...
Mithun Nagendra Prasad, Arcot Sowmya
ATC
2009
Springer
13 years 11 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop