Sciweavers

1291 search results - page 144 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SENSYS
2003
ACM
15 years 7 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
101
Voted
IPPS
2010
IEEE
15 years 13 days ago
KRASH: Reproducible CPU load generation on many-core machines
Abstract--In this article we present KRASH, a tool for reproducible generation of system-level CPU load. This tool is intended for use in shared memory machines equipped with multi...
Swann Perarnau, Guillaume Huard
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 8 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
221
Voted
ICDE
2006
IEEE
167views Database» more  ICDE 2006»
16 years 3 months ago
Better Burst Detection
A burst is a large number of events occurring within a certain time window. As an unusual activity, it's a noteworthy phenomenon in many natural and social processes. Many da...
Xin Zhang, Dennis Shasha
136
Voted
MVA
2007
174views Computer Vision» more  MVA 2007»
15 years 4 months ago
A Real-Time Hand Gesture Interface Implemented on a Multi-Core Processor
This paper describes a real-time hand gesture recognition system and its application to VCR remote control. Cascaded classifiers are used to detect a number of different hand pose...
Tsukasa Ike, Nobuhisa Kishikawa, Björn Stenge...