Sciweavers

1291 search results - page 133 / 259
» Intrusion Detection for Distributed Applications
Sort
View
DEBS
2008
ACM
13 years 10 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
MICCAI
2008
Springer
14 years 10 months ago
A Local Mutual Information Guided Denoising Technique and Its Application to Self-calibrated Partially Parallel Imaging
Abstract. The application of Partially Parallel Imaging (PPI) techniques to regular clinical Magnetic Resonance Imaging (MRI) studies has brought about the benefit of significantly...
Weihong Guo, Feng Huang
ICVS
2001
Springer
14 years 1 months ago
A Fault-Tolerant Distributed Vision System Architecture for Object Tracking in a Smart Room
Abstract. In recent years, distributed computer vision has gained a lot of attention within the computer vision community for applications such as video surveillance and object tra...
Deepak R. Karuppiah, Zhigang Zhu, Prashant J. Shen...
SDM
2011
SIAM
233views Data Mining» more  SDM 2011»
12 years 11 months ago
Distributed Monitoring of the R2 Statistic for Linear Regression
The problem of monitoring a multivariate linear regression model is relevant in studying the evolving relationship between a set of input variables (features) and one or more depe...
Kanishka Bhaduri, Kamalika Das, Chris Giannella
SAC
2010
ACM
14 years 3 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...