Sciweavers

1291 search results - page 121 / 259
» Intrusion Detection for Distributed Applications
Sort
View
VLDB
2004
ACM
129views Database» more  VLDB 2004»
14 years 2 months ago
Detecting Change in Data Streams
Detecting changes in a data stream is an important area of research with many applications. In this paper, we present a novel method for the detection and estimation of change. In...
Daniel Kifer, Shai Ben-David, Johannes Gehrke
IACR
2011
111views more  IACR 2011»
12 years 8 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 9 months ago
Detecting Weak but Hierarchically-Structured Patterns in Networks
The ability to detect weak distributed activation patterns in networks is critical to several applications, such as identifying the onset of anomalous activity or incipient conges...
Aarti Singh, Robert D. Nowak, A. Robert Calderbank
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
14 years 3 months ago
Target detection and position likelihood using an aerial image sensor
— Sensor-based control is an emerging challenge in UAV applications. It is essential in a sensing task to account for sensor measurement errors when computing a target position e...
Zu Whan Kim, Raja Sengupta
ISPAN
2009
IEEE
14 years 3 months ago
Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design
—In this paper, we present a design architecture of implementing a ”Vector Bank” into video encoder system, namely, an H.264 encoder, in order to detect and analyze the movin...
Ruei-Xi Chen, Wei Zhao, Jeffrey Fan, Asad Davari