Sciweavers

1291 search results - page 100 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ECCV
2008
Springer
14 years 11 months ago
Background Subtraction on Distributions
Environmental monitoring applications present a challenge to current background subtraction algorithms that analyze the temporal variability of pixel intensities, due to the comple...
Teresa Ko, Stefano Soatto, Deborah Estrin
INFOVIS
2005
IEEE
14 years 3 months ago
Visual Correlation for Situational Awareness
We present a novel visual correlation paradigm for situational awareness (SA) and suggest its usage in a diverse set of applications that require a high level of SA. Our approach ...
Yarden Livnat, James Agutter, Shaun Moon, Stefano ...
ACSAC
2002
IEEE
14 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
ICALP
2001
Springer
14 years 2 months ago
Hidden Pattern Statistics
Abstract. We consider the sequence comparison problem, also known as “hidden pattern” problem, where one searches for a given subsequence in a text (rather than a string unders...
Philippe Flajolet, Yves Guivarc'h, Wojciech Szpank...
ATC
2009
Springer
14 years 1 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...