Sciweavers

462 search results - page 56 / 93
» Information visualization for an intrusion detection system
Sort
View
WORM
2004
13 years 10 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
PAM
2007
Springer
14 years 2 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
CVPR
2011
IEEE
13 years 15 days ago
Novelty detection from an Ego-centric perspective
This paper demonstrates a system for the automatic extraction of novelty in images captured from a small video camera attached to a subject’s chest, replicating his visual persp...
Omid Aghazadeh, Josephine Sullivan, Stefan Carlsso...
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
IROS
2006
IEEE
131views Robotics» more  IROS 2006»
14 years 2 months ago
Visual Homing Navigation With Two Landmarks: The Balanced Proportional Triangulation Method
— Current approaches to the visual homing for mobile robot navigation are generally inspired in insects’ behavior and based on the observed angular information of fixed points...
Jose Francisco Bonora, Domingo Gallardo